NATO Allies Say Kinetic Response to Cyberattacks on Table

Just days before President Biden was set to meet with Russia President Vladimir Putin, with cyberattacks a key topic on the agenda, NATO heads of state and government met at the North Atlantic Council meeting in Brussels and issued a communiqué that u… Continue reading NATO Allies Say Kinetic Response to Cyberattacks on Table

Amazon Sidewalk, Apple AirTag and Involuntary Sharing

If you own an Amazon device (Ring, Echo, Dot, Plus, Show, Spot, Studio, Input or Flex) then starting this week, you may be sharing at least some attributes of your device with other Amazon device users. To create the kind of ubiquitous mesh network th… Continue reading Amazon Sidewalk, Apple AirTag and Involuntary Sharing

Ransomware Reshapes Health Care Security Landscape

A sharp rise in ransomware is buffeting the health care sector and forcing IT security professionals to reevaluate how they tackle the threat. More than a third of health care organizations were hit by ransomware in the last year, according to a Sopho… Continue reading Ransomware Reshapes Health Care Security Landscape

Cybersecurity Threats, Like the Pandemic, Still Lurk

The CrowdStrike 2021 Global Threat Report called 2020 one of the most active years in recent memory for those tasked with stopping breaches and protecting organizations against cyberattacks, provided details on trends that emerged throughout the year … Continue reading Cybersecurity Threats, Like the Pandemic, Still Lurk

Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders

Microsoft president and CLO Brad Smith says secretly subpoenaing data from cloud providers—blocking them from telling customers—must stop.
The post Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders appeared first on Security Boulevard.
Continue reading Microsoft’s Legal Head: U.S. must Stop Secret Gag Orders

Report Reveals AWS S3 Buckets are Poorly Protected

Research from Lightspin indicates that AWS S3 Buckets are not as secure as many users may think. Lightspin, which specializes in cloud security services, inspected more than 40,000 Amazon S3 buckets and found that improperly configured AWS permissions… Continue reading Report Reveals AWS S3 Buckets are Poorly Protected

Cloud Security Priorities Shift in Wake of Pandemic

The global pandemic has accelerated business transformation far past the cloud tipping point and uncovered severe and far-reaching implications for security teams, according to an Enterprise Strategy Group (ESG) survey of 500 IT and security personnel… Continue reading Cloud Security Priorities Shift in Wake of Pandemic

How do I select an ITSM solution for my business?

An IT service management (ITSM) solution guarantees that IT processes and services are combined with the business goals of an organization, thus helping it thrive. To select a suitable ITSM solution for your business, you need to think about a variety … Continue reading How do I select an ITSM solution for my business?

Who, Us? Linux Root Bug Quietly Added 7 Years Ago

A nasty vulnerability in most Linux distributions is raising eyebrows among the penguinistas.
The post Who, Us? Linux Root Bug Quietly Added 7 Years Ago appeared first on Security Boulevard.
Continue reading Who, Us? Linux Root Bug Quietly Added 7 Years Ago

Nurturing a Relationship between AI and the Security Team

No matter the industry, adding AI technologies to work processes has made a lot of employees nervous. There is fear that automation is taking over and that robots will eventually push out the human workforce. To quell these fears, it’s the respo… Continue reading Nurturing a Relationship between AI and the Security Team