[unable to retrieve full-text content]
Security Issues with Working Remotely (And How to Fix Them)
[unable to retrieve full-text content]
Cisco urges patching flaws in data-center, SD-WAN gear
Cisco has issued a number of critical security advisories for its data center manager and SD-WAN offering customers should deal with now. On the data center side, the most critical – with a threat score of 9.8 out of 10 – involves a vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could […]
Doki Backdoor Infiltrates Docker Servers in the Cloud
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
The ETSI IoT standard: are regulators doing enough to protect IoT devices?
The announcement of a new standard for Internet of Things (IoT) security by the ETSI technical committee in June 2020 was very much welcome in the infosec industry. ETSI EN 303 645 puts in place a security baseline for internet-connected products, and lays out 13 provisions outlining the steps manufacturers can take to secure devices and ensure […]
Critical Bugs in Utilities VPNs Could Cause Physical Damage
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Cloud software provider Blackbaud pays ransom, as incidents rise globally
WEEK IN IT SECURITY – Just as we were reporting last week on our sister site The Evolving Enterprise that ransomware is behind 1 in 3 cyber security attacks on organisations, news was breaking of another major ransom attack, reports Jeremy Cowan. This time South Carolina-based Blackbaud, a third-party supplier of database services and customer relationship management (CRM) systems for […]
How to tailor SASE to your enterprise
Businesses considering the secure access service edge (SASE) model need to understand that there are numerous ways to implement it that can be tailored to their future needs and the realities of their legacy networks. As defined by Gartner, which coined the term, SASE calls for security to be built in as part of the […]
Are newer medical IoT devices less secure than old ones?
Experts differ on whether older connected medical devices or newer ones are more to blame for making healthcare networks more vulnerable to cyberattack. The classic narrative of insecure IoT centers on the integration of older devices into the network. In some industries, those devices pre-date the internet, sometimes by a considerable length of time, so […]
vulnerability assessment (vulnerability analysis)
[unable to retrieve full-text content]