Yearly Archives: 2024
Federal cyber posture bolstered by TMF, says federal CIO
President Joe Biden's approval of the Technology Modernization Fund three years ago was noted by Federal Chief Information Officer Clar...
Lightpath Miami Expansion Includes New On-Net Data Centers and RapidPath Dark Fiber Service
Adding Eight On-Net Data Centers, RapidPath Quick Dark Fiber Deployment Between Data Centers in Five Days, and 15-Miles of Fiber Netw...
Australian regulator takes Optus to court over sales misconduct
News
The Australian Competition and Consumer Commission (ACCC) says the operator’s sales staff had acted “unconscionably” towards hundr...
How to think like an attacker: Preventative cybersecurity with Censys
In today’s rapidly changing cyber threat environment, traditional “inside-out” cybersecurity strategies, which focus primarily on defen...
Three common privilege access mistakes that can lead to a ransomware incident
COMMENTARY: SolarWinds, Colonial Pipeline, Hafnium Exchange. What do these attacks have in common? Beyond their status as some of the m...
Attack surface management: The key to securing expanding digital frontiers
The rapid evolution of cloud computing, the shift to remote work during the COVID-19 pandemic and the proliferation of privately owned ...
North Korean nation-state threat actor using Play ransomware
A North Korean state-sponsored threat actor is suspected of collaborating with the Play ransomware gang in a September cyberattack, Pal...
FakeCall malware menaces Android devices
Threat actors are using an Android malware payload to pull off an elaborate social-engineering scam.Researchers with mobile security sp...
Midnight Blizzard uses RDP to target 100 organizations in US, Europe
The Russian nation-state threat actor tracked as Midnight Blizzard has been running spear-phishing campaigns to thousands of targets at...
Oktane 2024: Implementing identity securely in today’s hybrid work era with Accenture – Damon McDougald
https://www.youtube.com/watch?v=06fCcqGtY1YToday’s cyber threat actors are capitalizing on organizations’ identity vulnerabilities, suc...