This man was planning to kill 70% of Internet in a bomb attack against AWS
The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70% of the internet. The FBI arrested Seth Aaron Pendley (28),…
How to provide both a Secure & Seamless Remote Onboarding Experience on a Regula Basis?
By Arif Mamedov, Ph.D., President of Regula Forensics, Inc. Onboarding is like a gateway, where you as a guard can either let the right person in or assure that a…
More Power, More Responsibility
What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology…
Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints
By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated,…
2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same
By Nir Gaist, Nyotron, Founder Cybersecurity has gone through many phases over the last few decades. Today, we hear about a new, more volatile-than-the-last attack every day that has the…
SAP systems are targeted within 72 hours after updates are released
On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm Onapsis warns. According to a joint study published by Onapsis…
Bitcoin Soars but Will Security Risks Spark Greater Regulation?
By Marcella Arthur – VP, Global Marketing at Unbound Tech Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and Mastercard after…
Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?
A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live…
Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it…
Top Tips For Securing Your DevOps Environment
By George J. Newton As of October 2020, experts estimate that roughly 60% of the world’s population is connected to the internet via some kind of device. As a result,…
The Best Network Protection: Go Deep or Go Broad?
By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their…
SOCs to Turn to Security Automation to Cope with Growing Threats
Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more…