April 18, 2023
Via: CSO OnlineAt first glance, the motivations to increase security maturity seem clear. Industry reporting fills news feeds advising on the latest threat or vulnerability poised to take over an organization’s systems to wreak havoc on local and global operations. However, while […]
April 13, 2023
Via: Network WorldBuilding on its WebEx product line, Cisco plans to deliver an air-gapped, cloud-based collaboration system for companies involved in US national security and defense work, extending the secure offerings the company already provides to industries that require collaboration tools with […]
April 12, 2023
Via: CSO OnlineThis week, Google launched a free API service that provides software developers with dependency data and security-related information on over 5 million software components across different programming languages. Today, the company also announced the general availability of its Assured Open […]
April 11, 2023
Via: CSO OnlineOn January 6, the United States Federal Communications Commission (FCC) launched a notice of proposed rulemaking (NPRM) to update its data breach reporting rules for telecommunications carriers. “The law requires carriers to protect sensitive consumer information but, given the increase […]
April 11, 2023
Via: CSO OnlineHolistically, Zero Trust is often described as a strategy or a framework, not a product sold by specific vendors. This is true; Zero Trust is a new way of security thinking that permeates several areas, not just architecture or technology. […]
Security, Software, Technology
April 7, 2023
Via: CSOThe US Cybersecurity and Infrastructure Security Agency (CISA) published seven advisories this week covering vulnerabilities in industrial control systems (ICS) and supervisory control and data acquisition (SCADA) software from multiple vendors. Some of the flaws are rated critical and two […]
March 21, 2023
Via: CSO OnlineOrganizations in developed countries are not as prepared for cybersecurity incidents compared to those in developing countries, according to Cisco’s Cybersecurity Readiness Index, released today. Countries that were found to be most mature in their overall cybersecurity readiness included Asia-Pacific […]
March 13, 2023
Via: CSOPhishing attempts are typically like fishing in a barrel — given enough time, a bad actor is 100% likely to reel in a victim. Once they recognize organizations as habitually vulnerable, they will continue to target them and the barrel-fishing […]
March 8, 2023
Via: CSONow more than ever, it’s essential for companies to have a cyber response framework in place long before an attack happens. The cyber threat landscape is constantly evolving, with familiar attack tactics like ransomware, phishing, and credential abuse and theft […]
March 7, 2023
Via: CSOSecurity leaders are embracing zero trust, with the vast majority of organizations either implementing or planning to adopt the strategy. The 2022 State of Zero-Trust Security report found that 97% of those surveyed either have or plan to have a […]
March 7, 2023
Via: CSODistributed denial-of-service (DDoS) attacks represent a significant threat for enterprise businesses. They start when an individual device (bot) or network of devices (botnet) is infected with malware. From there, the bot or botnet will flood websites or services with high […]
February 28, 2023
Via: RCR Wireless NewsRampant malicious activity in cyberspace hurts individuals, companies, and government agencies, while threatening US national security. The expected release of a new National Cybersecurity Strategy by the Biden Administration is an occasion for us to learn lessons from past efforts […]
February 15, 2023
Via: CSOAs IT operations migrated to the cloud, it became easier to support remote and hybrid workers. The problem is that it has also complicated the infrastructure IT and security teams are tasked to protect. Organizations far and wide have expanded […]
February 14, 2023
Via: RCR Wireless NewsDistributed denial-of-service (DDoS) DDoS attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. DDoS attacks typically target edge network devices like […]
February 14, 2023
Via: CSOWhen using any security tool, it is vitally important for it to help you to find a threat quickly. For most tools, there is a learning curve before you can use the tool effectively, as well as a period during […]
Hardware, Security, Technology
February 10, 2023
Via: RCR Wireless NewsChinese vendor ZTE said its 5G New Radio (NR) gNodeB product has been approved under Germany’s Federal Office for Information Security (BSI)’s NESAS (network equipment security assurance scheme) certification program. ZTE noted that NESAS Cybersecurity Certification Scheme – German Implementation […]
February 9, 2023
Via: CSOTrustwave SpiderLabs researchers have cited an increased prevalence of HTML smuggling activity whereby cybercriminal groups abuse the versatility of HTML in combination with social engineering to distribute malware. The firm has detailed four recent HTML smuggling campaigns attempting to lure […]
February 9, 2023
Via: CSOIt’s that time of year again when many of your favorite security professionals and vendors roll out their predictions for the coming year. Although not all of us have clairvoyant abilities, seasoned pros can spot a trend early and inform […]
February 7, 2023
Via: RCR Wireless NewsCisco has introduced a number of new cloud services in its IoT operations dashboard to increase industrial asset visibility and manage assets remotely and securely. At its annual Cisco Live event in Amsterdam, the firm said it had focused on […]
January 31, 2023
Via: CSOCybercrime is a growing scourge that transcends borders, spreading across the boundaries of virtually all the world’s nearly 200 nation-states. From ransomware attacks to rampant cryptocurrency theft, criminal exploitation of borderless digital systems threatens global economic security and the political […]