Security and Cheap ComplexityI’ve been saying that complexity is the worst enemy of security for a long time now. (Here’s me in 1999.) And it’s been...
Day: August 26, 2022
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Addressing Multiple Concerns with a Single Solution
Addressing Multiple Concerns with a Single SolutionOrganizations have been steadily implementing digital innovations for years, but recently the pace of implementation has greatly accelerated. Although the...
A Dramatic Shift in Network Security with Zero Trust Edge Strategy
A Dramatic Shift in Network Security with Zero Trust Edge StrategyMost organizations are deep into a phase of major growth and evolution that’s called “digital acceleration.”...
The Threat That Never Goes Away
The Threat That Never Goes AwayWhile digital acceleration and work-from-anywhere strategies may have been driven by the uncertain times brought about by the global pandemic, they...
Cyberthreats Racing Ahead of Your Defenses? Security-Driven Networking Can Put a Stop to That
Cyberthreats Racing Ahead of Your Defenses? Security-Driven Networking Can Put a Stop to ThatEnterprises of all shapes and sizes were deep into the process called digital...
Considerations for Evaluating Endpoint Detection and Response (EDR) Solutions
Considerations for Evaluating Endpoint Detection and Response (EDR) SolutionsEndpoint security solutions range from signature-based endpoint protection platform (EPP) or antivirus (AV) solutions to extended detection and...
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill AntivirusWe investigate mhyprot2.sys, a vulnerable anti-cheat driver for the popular role-playing game Genshin Impact. The driver is...
Required Capabilities for Effective and Secure SD-WAN: The Network Leader’s Guide
Required Capabilities for Effective and Secure SD-WAN: The Network Leader’s GuideThere are three main trends driving organizations to replace outdated wide-area networking (WAN) infrastructures with a...
Fortinet Secure SD-WAN Continually Received Analyst and Peer Recognition
Fortinet Secure SD-WAN Continually Received Analyst and Peer RecognitionFortinet Secure SD-WAN has caught the attention of industry analysts. Our unique Security-Driven Networking solution consolidates security and...
Fake DDoS pages on WordPress install the following…
Fake DDoS pages on WordPress install the following…EXECUTIVE SUMMARY: WordPress-based sites hacked? Security researchers say that WordPress pages are being hacked to display spoofed Cloudflare DDoS...
Infosec4TC Platinum Membership: Cyber Security Training Lifetime Access
Infosec4TC Platinum Membership: Cyber Security Training Lifetime AccessBe an Expert on Infosec4TC with Unlimited Access to Self-Paced Courses on GSEC, CISSP & More Infosec4TC understands the...
UK claims the unenviable title of “Fraud Capital of Europe”
UK claims the unenviable title of “Fraud Capital of Europe”By Gergo Varga, Evangelist, SEON. Plenty of national pride revolves around the accolades and titles a country...
8 best enterprise accounting software suites
8 best enterprise accounting software suitesEnterprise accounting software is designed for large companies and businesses. Here are the top eight enterprise accounting software suites. The post...
Zero Trust Segmentation: A primer for CISOs
Zero Trust Segmentation: A primer for CISOsEXECUTIVE SUMMARY: CISOs and network managers need to know which users can be trusted, and whether or not a workload...
Cosmetics giant Sephora first to be fined for violating California’s Consumer Privacy Act
Cosmetics giant Sephora first to be fined for violating California’s Consumer Privacy ActSephora will have to pay $1.2 million in penalties, inform California customers it sells...
Ex-Twitter security chief alleges ‘egregious’ and ‘reckless’ practices
Ex-Twitter security chief alleges ‘egregious’ and ‘reckless’ practicesEXECUTIVE SUMMARY: Twitter’s security poses a threat to its users’ information, to its shareholders, to national security and to...
Shout-out to whoever went to Black Hat and had North Korean malware on their PC
Shout-out to whoever went to Black Hat and had North Korean malware on their PCI am the one who NOCs The folks tasked with defending the...
Twilio breach let hackers gain access to Authy 2FA accounts
Twilio breach let hackers gain access to Authy 2FA accountsTwilio's investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts...
Educating the world about email security one call at a time
Educating the world about email security one call at a timeWith over 20 years of Sales, Marketing, leadership and Inside Sales development experience, Kelly carries a...
Twilio, Cloudflare just two of 135 orgs targeted by Oktapus phishing campaign
Twilio, Cloudflare just two of 135 orgs targeted by Oktapus phishing campaignThis, this is more like what we mean by a sophisticated cyberattack Criminals behind the...
Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed
Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployedAPIs have come to embody the yin and yang of our digital...
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply Chain Attack
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply Chain AttackThe "0ktapus" cyberattackers set up a well-planned spear-phishing effort that affected at least 130 orgs beyond...