News

  • Baltimore Conned Out of $375k

    PRIVACY PRIVACY OIG finds city had no authorized list of vendor signatories when it paid hacker posing as a vendor Read More

    Read More

  • Assess, Remediate, and Implement with CIS SecureSuite

    PRIVACY PRIVACY The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for small- and medium-sized businesses. This is particularly true for those with fully remote or hybrid work environments. Add to the mix limited resources and limited talent…

    Read More

  • Red Cross Hack Linked to Iranian Influence Operation?

    PRIVACY PRIVACY A network intrusion at the International Committee for the Red Cross (ICRC) in January led to the theft of personal information on more than 500,000 people receiving assistance from the group. KrebsOnSecurity has learned that the email address used by a cybercriminal actor who offered to sell the stolen ICRC data also was…

    Read More

  • What’s new in Microsoft’s Sentinel cloud SIEM

    PRIVACY PRIVACY Logging can be the most useful tool in your security arsenal, but it’s something we all tend to overlook and not assign appropriate resources to, as it can use up hard drive storage. Proper logs can provide evidence as to how an incident occurred and what the attacker did. Too often we don’t…

    Read More

  • Phishing Emails Impersonating LinkedIn Surge by 232% Amid ‘Great Resignation’

    PRIVACY PRIVACY Attackers are increasingly leveraging LinkedIn to socially engineer victims into clicking on phishing links Read More

    Read More

  • RSA Advisory Board Discuss Pressing Issues in Cybersecurity

    PRIVACY PRIVACY Three members of the RSA Advisory board offered insights into ransomware, Log4j and supply chain security Read More

    Read More

  • Vendors are Fixing Security Flaws Faster

    PRIVACY PRIVACY Google’s Project Zero is reporting that software vendors are patching their code faster. tl;dr In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago. In addition to the average now being…

    Read More

  • Three things you should know about SASE and SD-WAN

    PRIVACY PRIVACY As organizations have accelerated their plans to better enable dispersed workforces in a post-pandemic reality, many technology decision-makers are broadly rethinking their network architectures. Inevitably their discussions lead to comparisons and debates over both software-defined wide area network (SD-WAN) and secure access service edge (SASE) technologies. The similarities of SD-WAN and SASE can…

    Read More

  • Finance Officer Jailed After Stealing £200,000 from Charity

    PRIVACY PRIVACY Insider used some of the funds across online gambling sites Read More

    Read More

  • 4 security concerns for low-code and no-code development

    PRIVACY PRIVACY There’s an increased push for what is being dubbed the citizen developer, coupled with the desire to empower application development and creation by non-developers. This is typically facilitated using low-code or no-code frameworks. These frameworks and tools allow non-developers to use a GUI to grab and move components to make business logic friendly…

    Read More

News, Advisories and much more

Exit mobile version