Cybersecurity

AWS Secrets Manager Makes Security Simpler

A few weeks ago, Amazon released their AWS Secrets Manager for public use. This is a very welcome announcement. Despite the fact that everyone knows security and encryption are important in cloud applications and infrastructure, simple security measures are often overlooked. More people and applications use plain-text passwords and hand-modified config files than you would

AWS Secrets Manager Makes Security Simpler Read More »

Making the ROI of Cyber Attackers Unattractive

“I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” – Robert Mueller III, Former Director of the FBI Criminal trickery is an unavoidable aspect of

Making the ROI of Cyber Attackers Unattractive Read More »

GDPR: ensuring your website is secure

In the run up to the new General Data Protection Regulations (GDPR), new data shows that 86.5% of WordPress websites in the UK are vulnerable to known hackable exploits. With GDPR now only a month away, businesses across Europe are gearing up for what will potentially be one of the biggest shifts in data privacy

GDPR: ensuring your website is secure Read More »

Microsoft Warns of Rising Tech Support Scams, Calls for Industry-wide Cooperation

Incidents of tech support scams targeting susceptible PC users are increasing, Microsoft warned. The company received 153,000 reported complaints from consumers in 2017, 24 percent higher than the prior year, according to its detailed security report released on Friday. Image via Microsoft cloud blog Reported incidents came from 183 countries, suggesting a widespread global problem.

Microsoft Warns of Rising Tech Support Scams, Calls for Industry-wide Cooperation Read More »

Drupal Alerts Users to Download Patch to Fix Security Flaw

Open-source CMS Drupal has advised users to upgrade to the latest version of Drupal 7 and 8 to prevent a bug from affecting sites using the content management software. “A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal

Drupal Alerts Users to Download Patch to Fix Security Flaw Read More »

The “Three Lines of Defense” Model Only Works On Trust

A “people” perspective on GRC models It is no big secret that the “Three Lines of Defence” model underpinning many GRC practices in large firms is poorly understood and poorly applied at grass-root levels. Anecdotal evidence we observe in the field every day suggests that many organisations operate it in a variety of hybrid fashions

The “Three Lines of Defense” Model Only Works On Trust Read More »

Cryptomining, Malware, and What to Expect in 2018

Cryptomining is a process that requires computational power for confirming the validity of new transactions in a decentralized network, which results in new blocks added to blockchain—a public ledger of cryptocurrency transactions. As discussed in our Online Security Trends for 2018, cryptocurrency mining is growing significantly and will continue. Miners put the computing power of

Cryptomining, Malware, and What to Expect in 2018 Read More »

?
WP Twitter Auto Publish Powered By : XYZScripts.com