#cybersecurity | The Network Perimeter Is Dead. So Now What?

Digital transformation is driving wholesale changes in the processes and interactions that power businesses and government organizations. Networks that enable these organizations are more complex than ever before, and this complexity is blurring organizations’ true network perimeter. Remote workers, cloud systems, regional offices, mergers, and acquisitions all add to the…

read more

#cybersecurity | Presidential campaign websites fail at privacy, new study shows

Presidential campaign websites get a failing grade for privacy, according to a new study by the non-partisan Online Trust Alliance, an initiative of the Internet Society. The study analyzed campaign websites of 23 presidential campaigns websites, including 19 Democrat and four Republican, for correct Transport Layer Security (TLS) deployment, Sender…

read more

#cybersecurity | 5 OT security takeaways CISOs need to communicate to stakeholders

Operational technology (OT) is Gartner’s wide-ranging word for internet-connected industrial stuff, including industrial control systems (ICS) and supervisory control and data acquisition (SCADA) largely found in manufacturing and public utilities such as water treatment facilities and the energy grid.  Cyber attacks on OT can be devastating. When the NotPetya faux-ransomware…

read more

#cybersecurity | Directory traversal explained: Definition, examples and prevention

Directory traversal examples In September, researchers discovered a “critical severity” directory traversal vulnerability in Atlassian’s Jira Service Desk Server and Jira Service Desk Data Center that could allow attackers to protected information belonging to the company’s customers, says Satnam Narang, senior research engineer at Tenable Network Security.  “They can see bug…

read more

#cybersecurity | Zero-day vulnerability gives attackers full control of Android phones

Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware. The flaw affects phones models from multiple manufacturers including Google, Samsung, Huawei, LG and Xiaomi. The vulnerability is a use-after-free memory condition in the Android Binder component that can result in privilege escalation….

read more

#cybersecurity | Pay-As-You-Go Infrastructure for Your Hosted Datacenter: Introducing HPE GreenLake with Colocation

Alongside the tremendous growth of cloud in recent years we’ve seen a parallel and equally striking trend in on-premises infrastructure: the migration of IT assets to third-party facilities providers. Google “colocation market growth” and you’ll see a long list of reports from various analyst firms, each showing impressive annual growth…

read more

#cybersecurity | Rich PII enables sophisticated impersonation attacks

As companies ramp up protections against account takeovers, spearphishing and other impersonation attacks, attackers are upping their game by collecting more and richer personally identifiable information (PII). Unfortunately for defenders, this information is often easily available through public sources, leaked databases and black markets. That’s enabling more sophisticated business executive…

read more