Security
How to keep your Gmail account safe from hackers
Nowadays, every online service is being linked to your email account or your phone number and this is what is giving hackers an access point to explore your secrets-if/when the user shows laxity in securing their respective accounts. Keeping aside mobile phone security, for now, let’s talk about email security. Google mail or shortly called […]
Cloud Access Security Brokers: 2020
This post was originally published here by Rich Campagna . The biggest cloud security trend in the near term is the rapidly expanding cloud footprint that the typical enterprise must secure. Organizations are quickly moving beyond the core group of 8-10 apps, like Office 365 and Salesforce, that really defined the first few years of the enterprise cloud. While those […]
US Government Shutdown made NASA vulnerable to Cyber Attacks
Recent US Government Shutdown which lasted for almost 35 days is said to have put the employees of NASA to extreme cyber risks. Yes, you’ve read it right! The shutdown not only failed to pay the employees the salary but also stalled several critical science missions and exposed them to cyber threats launched by the […]
Security in our Mobile Phones is extremely weak say CheckPoint experts
Security experts from the CheckPoint Software Technologies, the Israel based cybersecurity firm say that the security factor in our mobile phones is extremely weak making them vulnerable to cyber attacks in a big way in 2019. Tony Jarvis, a Security Evangelist for Asia Pacific region, CheckPoint Technologies said that the vulnerability scale in the year […]
Harness the Power of IaaS Without Compromising Security
This post was originally published here by gregg rodriguez. This is the first of a two part series on the benefits of infrastructure-as-a-service (IaaS). Enterprises struggle to control costs and stay competitive – they face increasing demands to keep pace with requirements for data storage and protection, ever-changing regulations, and the daily threat of security […]
Healthcare: A Cloud Security Investigation (CSI)
This post was originally published here by Will Houcheime . More and more, modern healthcare firms are turning to cloud-based tools and enabling mobile data access from personal devices, bringing them higher productivity and employee satisfaction rates. However, organizations that allow physicians to work from unmanaged endpoints have significant data leakage concerns when they fail to equip themselves […]
Bitglass Security Spotlight: Breaches Expose Millions of Emails, Texts, and Call Logs
This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks: 773 million email accounts published on hacking forum Unprotected FBI data and Social Security numbers found online Millions of texts and call logs exposed on unlocked server South Korean Defense Ministry breached by hackers Ransomware forces City […]
Trending Cyber Attack news of UK
1.) NHS of Cumbria located in North West England has disclosed recently that it has been targeted by more than 150 cyber attacks in the last 5 years. A report from BBC has confirmed the news that the University Hospitals of Morecambe Bay NHS Trust, which runs hospitals in Barrow, Kendal, Morecambe, and Lancaster was […]
Bitglass Security Spotlight: DoD, Facebook, & NASA
This post was originally published here by Will Houcheime. Here are the top cybersecurity stories of recent weeks: Cybersecurity vulnerabilities found in US missile system Facebook shares private user data with Amazon, Netflix, and Spotify Personal information of NASA employees exposed Chinese nationals accused of hacking into major US company databases Private complaints of Silicon […]