News

  • Baltimore Conned Out of $375k

    OIG finds city had no authorized list of vendor signatories when it paid hacker posing as a vendor Read More

    Read More

  • Assess, Remediate, and Implement with CIS SecureSuite

    The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for small- and medium-sized businesses. This is particularly true for those with fully remote or hybrid work environments. Add to the mix limited resources and limited talent focused on…

    Read More

  • Red Cross Hack Linked to Iranian Influence Operation?

    A network intrusion at the International Committee for the Red Cross (ICRC) in January led to the theft of personal information on more than 500,000 people receiving assistance from the group. KrebsOnSecurity has learned that the email address used by a cybercriminal actor who offered to sell the stolen ICRC data also was used to…

    Read More

  • What’s new in Microsoft’s Sentinel cloud SIEM

    Logging can be the most useful tool in your security arsenal, but it’s something we all tend to overlook and not assign appropriate resources to, as it can use up hard drive storage. Proper logs can provide evidence as to how an incident occurred and what the attacker did. Too often we don’t keep logs…

    Read More

  • Phishing Emails Impersonating LinkedIn Surge by 232% Amid ‘Great Resignation’

    Attackers are increasingly leveraging LinkedIn to socially engineer victims into clicking on phishing links Read More

    Read More

  • RSA Advisory Board Discuss Pressing Issues in Cybersecurity

    Three members of the RSA Advisory board offered insights into ransomware, Log4j and supply chain security Read More

    Read More

  • Vendors are Fixing Security Flaws Faster

    Google’s Project Zero is reporting that software vendors are patching their code faster. tl;dr In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago. In addition to the average now being well below…

    Read More

  • Three things you should know about SASE and SD-WAN

    As organizations have accelerated their plans to better enable dispersed workforces in a post-pandemic reality, many technology decision-makers are broadly rethinking their network architectures. Inevitably their discussions lead to comparisons and debates over both software-defined wide area network (SD-WAN) and secure access service edge (SASE) technologies. The similarities of SD-WAN and SASE can sometimes lead…

    Read More

  • Finance Officer Jailed After Stealing £200,000 from Charity

    Insider used some of the funds across online gambling sites Read More

    Read More

  • 4 security concerns for low-code and no-code development

    There’s an increased push for what is being dubbed the citizen developer, coupled with the desire to empower application development and creation by non-developers. This is typically facilitated using low-code or no-code frameworks. These frameworks and tools allow non-developers to use a GUI to grab and move components to make business logic friendly applications. Empowering…

    Read More