Cisco Secure: Supporting NIST Cybersecurity Framework

Extending the alignment to include more Cisco products Why should you care? With so many security frameworks, it can be difficult to know where to start from. While many organizations are challenged with managing and improving their cybersecurity programs against the dynamic threat landscape, it’s not easy to pick one framework over another. So where … Continue reading Cisco Secure: Supporting NIST Cybersecurity Framework

[eBook] 7 Signs You Might Need a New Detection and Response Tool

It's natural to get complacent with the status quo when things seem to be working. The familiar is comfortable, and even if something better comes along, it brings with it many unknowns. In cybersecurity, this tendency is countered by the fast pace of innovation and how quickly technology becomes obsolete, often overnight. This combination usually … Continue reading [eBook] 7 Signs You Might Need a New Detection and Response Tool

Announcing SecureX Academy

SecureX has changed the way our customers do the work of securing their environments. We have been able to bring together the Cisco Secure portfolio, 3rd party tools and data sources, and a robust platform architecture into which these technologies can be plugged, in a way that saves organizations time and money and increases their … Continue reading Announcing SecureX Academy

Manage the Cloud Permissions Gap to Achieve Zero Trust

The Cloud Permissions Gap exposes organizations to highly exploitable risk combined with the inability to implement and manage Zero Trust policies. By Raj Mallempati, CloudKnox Security COO In 2020, when organizations were prioritizing digital transformation so they could pivot to remote work on an unprecedented scale, Gartner added a new category to its 2020 Hype … Continue reading Manage the Cloud Permissions Gap to Achieve Zero Trust

Attackers Find New Way to Exploit Google Docs for Phishing

Attackers Find New Way to Exploit Google Docs for Phishing Tactic continues recent trend by attackers to use trusted cloud services to send and host malicious content. Researchers spotted what they describe as a new method that attackers appear to be using to lure victims to malicious phishing websites via Google Docs. The attack chain … Continue reading Attackers Find New Way to Exploit Google Docs for Phishing

Poland blames Russia for breach, theft of Polish officials emails

Poland's deputy prime minister Jarosław Kaczyński says last week's breach of multiple Polish officials' private email accounts was carried out from servers within the Russian Federation. "After reading the information provided to me by the Internal Security Agency and the Military Counterintelligence Service, I inform you that the most important Polish officials, ministers, and deputies … Continue reading Poland blames Russia for breach, theft of Polish officials emails

The return of TA402 Molerats APT after a short pause

TA402 APT group (aka Molerats and GazaHackerTeam) is back after two-month of silence and is targeting governments in the Middle East. The TA402 APT group (aka Molerats and Gaza Cybergang) is back after a two-month of apparent inactivity, it is targeting government institutions in the Middle East and global government entities with interest in the … Continue reading The return of TA402 Molerats APT after a short pause

Data Breaches Surge in Food & Beverage, Other Industries

Data Breaches Surge in Food & Beverage, Other Industries Six previously "under-attacked" vertical industries saw a surge in data breaches last year due to COVID-19 related disruptions and other factors, new data shows. Though no industry is immune from cyberattacks, a few have traditionally been less affected by them than others. A new study shows … Continue reading Data Breaches Surge in Food & Beverage, Other Industries

Microsofts new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

Devices have multiple OSs and firmware running, and most organisations don't know what they have or if it's secure. Microsoft will use ReFirm to make it easier to find out without being an expert. Image: Microsoft As operating systems become more secure, attackers are increasingly shifting their attention to firmware, which is less visible, more … Continue reading Microsofts new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices

The Solution to Overcoming Cyber Threats in A 5g World

Optical Wireless Communciations (Owc) Will Be Key For Maximizing Security By Michael Abad-Santos, Senior Vice President of Business Development and Strategy, BridgeComm Nearly 6 billion Internet of Things (IoT) devices were in service worldwide at the end of 2020, according to Gartner. But mobile operators aren’t the only ones chasing that opportunity. Hackers are, too. … Continue reading The Solution to Overcoming Cyber Threats in A 5g World