How to Ensure Security when Buying a Refurbished or Second-Hand Smartphone

Last year, a Which? investigation found that 31% of resold smartphone models from three of the major used and refurbished handset stores are no longer receiving security updates. Phone manufacturers only schedule data updates for a certain period … Continue reading How to Ensure Security when Buying a Refurbished or Second-Hand Smartphone

Cybersecurity for the Public Sector: Partnering with Carahsoft

Cybersecurity for the Public Sector: Partnering with Carahsoft
 
The public sector is on alert. Cyber breaches occur at an accelerated rate; attackers are getting more intelligent, more sophisticated, and better funded. Government agencies are hy… Continue reading Cybersecurity for the Public Sector: Partnering with Carahsoft

Apple Mum on 128 Million Users Hack

September 21, 2015, happened to be a big day for Apple. Not because they had to launch a new product. It was because they had to choose if they wanted to announce 128 million Apple users were hacked or be silent about it. According to Ars Technica, res… Continue reading Apple Mum on 128 Million Users Hack

Rail Firm Staff Fail ‘Bonus’ Phishing Test, Chaos Ensues

“Click here to claim your bonus pay,” said email from a British train company. But it was a phishing test—and now the staff are hopping mad.
The post Rail Firm Staff Fail ‘Bonus’ Phishing Test, Chaos Ensues appeared first on Security Boule… Continue reading Rail Firm Staff Fail ‘Bonus’ Phishing Test, Chaos Ensues

Lessons in Securing Development Environments

The new world of software development is inherently collaborative — development teams are geographically dispersed and require easily accessible and automated tools to ship products and features quicker with confidence. The new generation of developme… Continue reading Lessons in Securing Development Environments

Ransomware Attack Hits a Major US Oil Pipeline

Colonial Pipeline, one of the largest oil pipelines in the US, was hit by a ransomware attack that forced it to shut down. This 5,500-mile-long pipeline, which carries more than 100 million gallons of fuel from Houston to New York Harbour every day, ha… Continue reading Ransomware Attack Hits a Major US Oil Pipeline

Are Cybercriminals Evil or Greedy?

Are cybercriminals by nature evil?  Only the 1930s pulp magazine hero The Shadow really knows “what evil lurks in the hearts” of cybercriminals. At first glance, it would appear there is great deal of darkness in the hearts of malicious ha… Continue reading Are Cybercriminals Evil or Greedy?

Predictive Security Analytics Use Cases

The range of predictive security analytics use cases a vendor offers fundamentally defines the maturity…
The post Predictive Security Analytics Use Cases appeared first on Gurucul.
The post Predictive Security Analytics Use Cases appeared first on Se… Continue reading Predictive Security Analytics Use Cases

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend in a modern, non-signature attack threatscape.
The post … Continue reading The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

Your Security Awareness Training Isn’t Working

Humans are the biggest risk to an organization’s cybersecurity posture, and it might be a bigger risk than many realize. According to research from Elevate Security, human behavior had a direct role in 88% of total losses in the largest cybersecurity … Continue reading Your Security Awareness Training Isn’t Working