Executive Summary The “Security Alert” scam is a prevalent tech-support fraud that threatens both Windows and Apple users. It exploits the trust of users by masquerading as an official support site, using fake pop-up warnings to lure users into dialing scam phone numbers by conveying a sense of urgency. The ultimate goal is gaining remote…

Read More

May 01, 2024NewsroomNational Security / Insider Threat A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. “This sentence should serve as a stark warning to all those entrusted with protecting national defense information that there…

Read More

Kansas City Cybersecurity Conference, Virtual and Kansas City, Missouri: June 6 SecureWorld Chicago, Chicago, Illinois: June 6 IDC Security Roadshow, Doha, Qatar: June 10 AWS re:Inforce, Philadelphia, Pennsylvania: June 10 – 12 AppSec SoCal, Santa Monica, California: June 12 Boston Cybersecurity Conference, Boston, Massachusetts: June 13 Cybersecurity Soiree, Paris, France: June 13 Montreal Cybersecurity Conference,…

Read More

Devices that don’t meet this requirement may be unable to access work or school resources. In firms, often you are purchasing computers and laptops that have Windows 11 preloaded. As a result, these systems come with Secure Boot enabled and a TPM chip. Furthermore, many of you are mandated to deploy Bitlocker to provide for…

Read More

In this day and age, technology and business are inextricably linked. Digital transformation has ushered in unparalleled opportunities for organizations that act with agility in response to the blistering pace of change and look for ways to harness the potential of technology to advance their business. However, the growing reliance on digital systems, coupled with…

Read More

Apply appropriate updates provided by Google to vulnerable systems immediately after appropriate testing. (M1051: Update Software) Safeguard 7.1: Establish and Maintain a Vulnerability Management Process: Establish and maintain a documented vulnerability management process for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard. Safeguard 7.4: Perform…

Read More

‘Let me just say that we’re excited to be focused on the channel. We’re excited to continue to recruit help our partners be as productive as humanly possible. We’re seeing improvement there, but it’s not enough yet, and so I just look at it as a huge opportunity to have more feet on the street,…

Read More

The majority of the scanning activity is coming from IP addresses assigned to just a handful of ASNs, mostly AS49870 (Alsycon, a hosting provider out of the Netherlands) and AS47890 (Unmanaged Ltd, what looks to be an IT consulting firm based out of the UK). The scanners appear to be using VPS or other resources…

Read More

‘We’re at $100 billion-plus annualized revenue run rate, yet 85 percent or more of the global IT spend remains on premises. And this is before we even calculate GenAI, most of which will be created over the next 10 to 20 years from scratch and on the cloud. There’s a very large opportunity in front…

Read More

In AMD’s first-quarter earnings call, CEO Lisa Su teases that the company will share details in the ‘coming months’ about new Instinct accelerator chips for data centers arriving ‘later this year into 2025’ amid heightened competition with Nvidia. AMD’s business is in much better shape than it was a year ago, thanks to its PC…

Read More