Month: May 2024
May 01, 2024NewsroomNational Security / Insider Threat A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. “This sentence should serve as a stark warning to all those entrusted with protecting national defense information that there…
Read MoreKansas City Cybersecurity Conference, Virtual and Kansas City, Missouri: June 6 SecureWorld Chicago, Chicago, Illinois: June 6 IDC Security Roadshow, Doha, Qatar: June 10 AWS re:Inforce, Philadelphia, Pennsylvania: June 10 – 12 AppSec SoCal, Santa Monica, California: June 12 Boston Cybersecurity Conference, Boston, Massachusetts: June 13 Cybersecurity Soiree, Paris, France: June 13 Montreal Cybersecurity Conference,…
Read MoreDevices that don’t meet this requirement may be unable to access work or school resources. In firms, often you are purchasing computers and laptops that have Windows 11 preloaded. As a result, these systems come with Secure Boot enabled and a TPM chip. Furthermore, many of you are mandated to deploy Bitlocker to provide for…
Read MoreIn this day and age, technology and business are inextricably linked. Digital transformation has ushered in unparalleled opportunities for organizations that act with agility in response to the blistering pace of change and look for ways to harness the potential of technology to advance their business. However, the growing reliance on digital systems, coupled with…
Read MoreApply appropriate updates provided by Google to vulnerable systems immediately after appropriate testing. (M1051: Update Software) Safeguard 7.1: Establish and Maintain a Vulnerability Management Process: Establish and maintain a documented vulnerability management process for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard. Safeguard 7.4: Perform…
Read More‘Let me just say that we’re excited to be focused on the channel. We’re excited to continue to recruit help our partners be as productive as humanly possible. We’re seeing improvement there, but it’s not enough yet, and so I just look at it as a huge opportunity to have more feet on the street,…
Read MoreThe majority of the scanning activity is coming from IP addresses assigned to just a handful of ASNs, mostly AS49870 (Alsycon, a hosting provider out of the Netherlands) and AS47890 (Unmanaged Ltd, what looks to be an IT consulting firm based out of the UK). The scanners appear to be using VPS or other resources…
Read More‘We’re at $100 billion-plus annualized revenue run rate, yet 85 percent or more of the global IT spend remains on premises. And this is before we even calculate GenAI, most of which will be created over the next 10 to 20 years from scratch and on the cloud. There’s a very large opportunity in front…
Read MoreRecent Posts
- Security plugin flaw in millions of WordPress sites gives admin access
- Phishing emails increasingly use SVG attachments to evade detection
- Fake AI video generators infect Windows, macOS with infostealers
- T-Mobile confirms it was hacked in recent wave of telecom breaches
- GitHub projects targeted with malicious commits to frame researcher