Intel Enables Better Data Security with Crypto Acceleration

Data is essentially the “oil” or “gold” of the Internet Era. Data is crucial for both businesses and individuals—and has significant value for cybercriminals. Data needs to be protected, but that is often easier said than done. Encryption is one of the… Continue reading Intel Enables Better Data Security with Crypto Acceleration

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change.
The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Continue reading Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

Move to all-flash object storage to occur within five years

Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry towards flash-based object storage to fuel AI, ML, automation, and big data analy… Continue reading Move to all-flash object storage to occur within five years

Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets

Apple’s under fire yet again for iOS security bugs in WebKit—the code behind the Safari browser.
The post Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets appeared first on Security Boulevard.
Continue reading Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets

How to leverage accountability to ensure sustainable enterprise security

As post-pandemic economic recovery continues to drive rapid acceleration in digital transformation, documented data breaches and service disruptions caused by cybercriminal activity have become an unwelcome part of our daily news feed. In spite of the … Continue reading How to leverage accountability to ensure sustainable enterprise security

US offers $10 million reward in hunt for state-sponsored ransomware attackers

The United States Department of State is offering a reward of up to $10 million for information leading to the identification of anyone, working for a foreign government, who participates in a cybercriminal attack against American critical infrastructu… Continue reading US offers $10 million reward in hunt for state-sponsored ransomware attackers

Bitglass Security Spotlight: Kaseya Ransomware Attack Aftermaths and More Post-Ransomware Data Breaches

Here are the top security stories from recent weeks: 

Kaseya Patches Zero-Day Vulnerabilities Used in Supply Chain Ransomware Attack
Attackers Use Kaseya Ransomware Attack to Spread Cobalt Strike Backdoor in Fake Security Updates
Morgan Stanley Repor… Continue reading Bitglass Security Spotlight: Kaseya Ransomware Attack Aftermaths and More Post-Ransomware Data Breaches

Disrupting Ransomware with Advanced File System Techniques

Technology is becoming more effective at early ransomware detection. Solutions can often automatically shut down attacks and minimize the damage. It is reasonable to conclude, however, that there is no truly impenetrable ransomware defense. The more c… Continue reading Disrupting Ransomware with Advanced File System Techniques

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary Coast of northern Africa. The Barbary States had been the scourge of the seas for centuries. They raided coastal … Continue reading Barbary Pirates and Russian Cybercrime

Where Did REvil Ransomware Go? Will it Be Back?

Speculation swirled over why the prolific and dangerous REvil ransomware went offline – blog, payment processing, all suddenly went kaput – it’s important not to lose sight of the bigger issues. While the ransomware is gone, at least for the time bein… Continue reading Where Did REvil Ransomware Go? Will it Be Back?