Wednesday, April 24, 2019

The Ways That The World Cup, Leg Day and Zero Trust Can Teach Us Lessons

We can improve the overall security posture of our own organizations when we address changes a little bit at a time as opposed to getting lost in the hand wringing of what could have been. The move towards zero...

How A Leading Cyber Security Company Uses Blockchain Technology To Prevent Data Tampering

The leading cyber security company, Acronis, explains how blockchain technology is being used to prevent data tampering, which has become a major threat for cyber security.

How Deception Technology Gives You The Upper Hand In Cybersecurity

Deception offers an effective way to detect attacks in progress, with no false positives. It alters the balance of power between attacker and target, giving companies the upper hand in combating both external and internal threats.

IBM’s HR Chief Shares Best Advice On The Future Of Work

IBM Chief of Human Resources Diane Gherson shares her best career advice and the future of work.

The Evolving Enterprise Calculus Of Public Cloud Versus Private Infrastructure

There is clear enterprise consensus that hybrid cloud is the appropriate long-term strategic approach to best leverage cloud computing. There has been much less consensus in decision-making on the underlying use of public cloud versus private infrastructure for individual...

SAP BrandVoice: Blockchain Makes Used Car Salesmen The Most Trusted People On The Planet

Show floor demo at the SAPPHIRE NOW and ASUG Annual Conference showed how blockchain, IoT and machine learning disrupt industries by enabling new customer services.

200,000 Routers Turned Into Mindless Crypto Coin Mining Zombies

A malware infection is targeting people's routers and it's forcing them to mine for cryptocurrency.

Artificial Intelligence, Gates, Rockefeller, Sloan, Carnegie & Ford Can Defeat Bad Social Media

Fake news, conspiracies, and outright lies (FCL) intended to undermine US institutions and the US culture are exploding in social media. Artificial intelligence (AI) can help identify FCL when they occur and counter-attack in real-time with evidence. ...

Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links

A new report from CrowdStrike highlights the growing risk of supply chain attacks and how unprepared most organizations are to detect or respond to them.

These Are The Five Most Dangerous Email Attachments

Your email inbox can be a dangerous place to navigate, particularly if you don't know how to spot a suspicious message.

Samsung Sneaks Out Sexy New Galaxy Tab 4 Prior To Unpacked Event

Today, Samsung launched the Galaxy Tab S4, a premium Android tablet with DeX capabilities and new S Pen, but also is consistent with its solid entertainment features like high PPI displays, quad speakers, and Dolby Atmos support. Here are...

Facebook Boots More Covert ‘Bad Actors’ While Leaving Others In Plain Sight

Facebook announced it has deleted 32 pages linked to disinformation and political interference; unfortunately, the platform's chock full of them.

The Most Influential Person In UK IT Discusses Digital Transformation

For the past four years, Mayank Prakash has been the Chief Information and Digital Officer of UK’s Department for Work and Pensions, which looks after children with separated parents, the working class, people with disabilities, and retirees to produce...

Cryptojacking Displaces Ransomware As Most Popular Cyberthreat

Cryptojacking can no longer operate under the covers. Every CISO must understand the significance of this threat, and rank cryptojacking among the top cyberthreats facing the enterprise. Complacency is no excuse.

Chinese Hackers Are Attacking Government Agencies Via Snail Mail

Why bother with sophisticated hacks over the Internet if you can trick someone into infecting themselves the old fashioned way?

Stuxnet Family Tree Grows

What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack.

Another dark web marketplace bites the dust –Wall Street Market

Two major dark web marketplaces for buying illegal products shut down in the span of a month.

Google File Cabinet Plays Host to Malware Payloads

Researchers detect a new drive-by download attack in which Google Sites' file cabinet template is a delivery vehicle for malware.

Demonstration Showcase Brings DevOps to Interop19

Attendees will learn how orchestration and automation can be a part of network operations and security, even at smaller companies.

What Home Buying Can Teach Us About Continuous Monitoring

Companies have been brainwashed to solely rely on hiring major auditing companies to help monitor and audit their vendors’ security. Assessments from these traditional auditors are typically an annual point-in-time affair. With technology advancing much more frequently, this outdated...