News

  • A Third of UK Businesses Experience Cyber-Attacks at Least Once a Week

    PRIVACY PRIVACY Around two in five businesses experienced breaches or cyber-attacks in the past 12 months Read More

    Read More

  • Introducing Personal Data Cleanup

    PRIVACY PRIVACY We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and people search sites. Now, you can feel more confident by removing personal info from data broker sites and keeping it from being collected, sold, and used to: advertise products to…

    Read More

  • AT&T Cybersecurity earns four Cybersecurity Excellence Awards

    PRIVACY PRIVACY Will Eborall, Asst VP, AT&T Cybersecurity and Edge Solutions Product Management, co-authored this blog. The AT&T Cybersecurity team’s unwavering focus on managing risk while maximizing customer experience earns high marks from security experts and customers alike. The team garnered some well-earned official recognition of the quality of flexible services they run with the…

    Read More

  • NCSC: Time to Rethink Russian Supply Chain Risks

    PRIVACY PRIVACY Kremlin coercion and sanctions could impact Western customers Read More

    Read More

  • Why metrics are crucial to proving cybersecurity programs’ value

    PRIVACY PRIVACY As solutions to managing cybersecurity threats increase, surprisingly few metrics are available on how well these methods work to secure organizational assets. The National Institute of Standards and Technology (NIST) has pioneered information security performance measurement models that can produce metrics. (Note: NIST’s work in this area is now being updated.) Aside from…

    Read More

  • Why authentication is still the CISO’s biggest headache

    PRIVACY PRIVACY Authentication remains one of the most painstaking challenges faced by CISOs in organizations large and small. This longstanding, fundamental element of security continues to cause headaches for security leaders seeking to identify and authorize users and devices often spread across different states, borders, and time zones. Meanwhile, persistent risks associated with ineffective authentication…

    Read More

  • 4 ways attackers target humans to gain network access

    PRIVACY PRIVACY Every day, I see the failure in our technology. I’m sure you see it as well. Since the day we started receiving email, we have failed at protecting recipients from scams, phishes and other email messages that they don’t want. I remember the infamous email-based computer worm, the “ILOVEYOU virus,” that infected fellow…

    Read More

  • Log4Shell Used in a Third of Malware Infections

    PRIVACY PRIVACY Software supply chain attacks realize researchers’ worst fears Read More

    Read More

  • Attackers Steal $618m From Crypto Firm

    PRIVACY PRIVACY Cyber-heist could be biggest ever recorded Read More

    Read More

  • What is Shodan? The search engine for everything on the internet

    PRIVACY PRIVACY Shodan is a search engine for everything on the internet — web cams, water treatment facilities, yachts, medical devices, traffic lights, wind turbines, license plate readers, smart TVs, refrigerators, anything and everything you could possibly imagine that’s plugged into the internet (and often shouldn’t be). Google and other search engines, by comparison, index…

    Read More

News, Advisories and much more

Exit mobile version