dcsimg

Facebook Too Big For Compliance: Are Record Fines Ineffective?

Do the latest fines against Facebook matter or is Facebook going to continue with business as usual? … [Read more...]

Five must-read books on cyber security

Books are a great way of increasing your cyber security knowledge, but with thousands to choose from, it’s difficult to know where to begin.  To help you get the best information available and enable you to advance your cyber security career, we’ve chosen some of our best titles for you. Security in the Digital World Technology is always developing, and so are the threats and risks of being … [Read more...]

Enforcing HIPAA Might Just Be Getting Easier

A new bill recently passed by a Senate Committee incentivizes healthcare entities to adopt cybersecurity policies, and therefore making it easier for authorities to enforce the Health Insurance Portability and Accountability Act (HIPAA). The piece of legislation has been introduced to help lower the cost of healthcare, but it touches upon healthcare in that it asks providers to focus on … [Read more...]

Podcast: Have You Met? QBITS

In this Have You Met? podcast, we sat down with Daniel Hotz of QBITS, a Progress partner based in Switzerland, to see how they are implementing MOVEit managed file transfer in the various regions they server clients. … [Read more...]

Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void

Sodinokibi, also known as Sodin and REvil, is hardly six months old, yet it has quickly become a topic of discussion among cybersecurity professionals because of its apparent connection with the infamous-but-now-defunct GandCrab ransomware. On May 31, the threat actors behind GandCrab formally announced their retirement, detailing their plan to cease selling and advertising GandCrab in a dark … [Read more...]

No man’s land: How a Magecart group is running a web skimming operation from a war zone

Our Threat Intelligence team has been monitoring the activities of a number of threat actors involved in the theft of credit card data. Often referred to under the Magecart moniker, these groups use simple pieces of JavaScript code (skimmers) typically injected into compromised e-commerce websites to steal data typed by unaware shoppers as they make their purchase. During the course of an … [Read more...]

Vulnerability Management Fundamentals: What You Need to Know

In part one of our five-part series on Vulnerability Management fundamentals, we explore the four stages of the Cyber Exposure lifecycle.  Truth is ever to be found in simplicity, and not in the multiplicity and confusion of things. —Sir Isaac Newton At Tenable, we are pioneering the discipline of Cyber Exposure to help cybersecurity teams measure and manage their cyber risk. Cyber Exposure is … [Read more...]

Choosing the Right Tools for Your Business

<p>Whether you’re just starting out in the IT service business or you’re trying to expand, having the right tools to help you do your job can not only make your life much easier, it can make your business more successful.</p> Read More … [Read more...]

Citrix Workspace App | What Is It and Why Use It?

Citrix Workspace App The Citrix Workspace app (formerly known as Citrix Receiver) allows users to securely access applications, services, and data from diverse desktop and mobile devices. By using this app, you can get access to all your Software as a Service (SaaS) and web applications, files and mobile apps instantly. This workspace can be accessed from various endpoint devices and operating … [Read more...]