Posts in tag

Cybersecurity


Rackspace Technology™, a leading end-to-end multicloud technology solutions company, will co-sponsor The New Cybersecurity Landscape virtual event with Armor® on October 7th at 10:00 am CT as part of the company’s Solve Strategy Series. From Zoom bombing to account takeovers, through access mining and phishing, the event will shed light on emerging security threats and empower viewers with …

IBM Security announced a new risk-based service designed to help organizations apply the same analytics used for traditional business decisions to cybersecurity spending priorities. IBM’s new Risk Quantification Services creates risk assessments to help clients identify, prioritize and quantify security risk as they weigh decisions such as deploying new technologies, making investments in their business …

Nowadays, manufacturers can connect their devices to the Alexa voice speaker system or integrate Amazon’s assistant directly into their products. This integration requires that their devices undergo a series of tests to validate that they meet all of Amazon’s requirements, including new cybersecurity requirements (secure booting, hardware encryption, key storage, privileges, etc.). To this end, …

The CERT at Retarus has issued a warning regarding phishing emails in which recipients are instructed to edit important business partner contracts. The phishers pretend to make the document available on the otherwise reputable Dotloop platform, directing the recipients to a fake login page for their Microsoft account. The fraudulent emails bear the Microsoft logo as …

Watch out, these applications have vulnerabilities with the highest share of exploits used by cybercriminals. Microsoft Office Suite, Android applications, and browsers are the three most common targets of cybercriminals during cyber attacks, according to the latest analysis of the AO Kaspersky Lab which was conducted for Q3 2019. These three accounts for 95.41% of …

In light of the current situation with COVID-19, public sector agencies are turning to the cloud more than ever, particularly as people increasingly need access to information and government services. Today, we’re happy to share more on our efforts to help governments with their COVID-19 needs and also highlight a few recent agreements with state …

With so much information stored in the cloud, the consequences of cyber-breaches are only increasing in severity. Some countries are better prepared than others when it comes to these threats. It is important to know the vulnerability of your own country in order to gauge if you’re doing enough when it comes to ensuring the …

The Dell Technologies Global Data Protection Index 2020 Snapshot reveals that organizations on average are managing almost 40% more data than they were a year ago. With this surge in data comes inherent challenges. The vast majority (81%) of respondents reported their current data protection solutions will not meet all of their future business needs. The …

SaltStack®, the creators of intelligent automation software for security operations teams, today announced it won four 2020 Cyber Defense InfoSec Awards in the categories of “Cutting Edge InfoSec Startup of the Year,” “Next Gen Compliance,” “Best Product for Patch and Configuration Management,” and “Most Innovative Vulnerability Assessment, Remediation, and Management.” SaltStack also took home the 2020 SC …

Internet crime has gained the most number of victims and the largest amount of dollar losses in the year 2019. This is according to the data collected by the FBI’s Internet Crime Complaint Centre (IC3) included in their 2019 Internet Crime Report. Highlights In 2019 alone, Americans who filed a complaint in the IC3 lost …