Category: Cybersecurity Insiders

Ransomware attack on Australia Car Auction Company

Manheim Auctions, a car auction company operating in Australia was recently targeted by a Ransomware Cyber Attack and news is out that the hackers are demanding $30 million as a ransom to free up the database from the file-encrypting malware.…

Ransomware Attack on City of Chateauguay

A Canadian province called the City of Chateauguay is said to be reining under the influence of a ransomware attack preventing employees of the city from working and holding some information as a hostage.   As the revelation of details…

How to spot a fake app?

This blog was written by an independent guest blogger. There are billions of mobile phone users in the world, and every day, the number increases as people find convenience in the use of smartphones. As the number of smartphone user…

Why vendor management is a cornerstone of security

When it comes to building a security program, one of the most frequently overlooked areas is that of vendor management. Organizations focus significant resources on internal security, such as vulnerability scans, centralized log management, or user training, while not extending…

Equifax invests $1.25 Billion in Cloud Security

US Credit Reporting Agency Equifax has made it official that it is going to invest $1.2 billion in cloud security business through the C3M cloud partner. The company which hit news headlines for a data breach now seems to desire…

Acquisition to boost Accenture Security

Ireland based professional services company Accenture has recently acquired a UK based Context Information Security company to boost its Cybersecurity platform Accenture Security on a global note. The objective of the deal is to accelerate the growth of its existing…

How a small business can achieve Zero Trust security

Contrary to popular belief, small businesses don’t need to be restricted by their budgets and productive capacity – especially when it comes to security. By using the right Zero Trust approach, businesses can prevent data breaches, all while continuing to…

Is the cybersecurity skills gap real?

An independent guest blogger wrote this blog. If you do a web search for “cybersecurity skills gap,” you’ll get many, many pages of results. It’s certainly a hot topic in our industry. And it’s a matter that security practitioners and…

RYUK Ransomware attack on Emcor Group

EMCOR Group which is well renowned as EMCOR- a Fortune 500 company, has disclosed that it became a victim of an RYUK Ransomware attack in February this year. As per the details available to Cybersecurity Insiders, the file-encrypting malware attack…

Cyber Attack on Boots Advantage Card Database

UK based Health and Pharmacy retailer ‘Boots’ has made it official that it has halted its customers from purchasing products on its website using its loyalty card reward points as hackers reportedly hacked passwords of its 140,000 customers of the…

Why vendor management is a cornerstone of security

When it comes to building a security program, one of the most frequently overlooked areas is that of vendor management. Organizations focus significant resources on internal security, such as vulnerability scans, centralized log management, or user training, while not extending…

Cybersecurity warning for millions of websites

According to a security report released by BBC, millions of websites might face a risk of insecurity from March 4th,2020 due to a bug found in the digital certificates utilized to secure their access.   It is estimated that over…

CIA faces digital espionage allegations from China

US Central Intelligence Agency (CIA) is alleged of conducting espionage on China for 11 years and the allegations were laid by a Chinese security firm named Qihoo 360. Reports are in that the espionage was conducted in digital form-all through…

Ransomware attack knocks down Epiq Global

Technology-based legal services provider Epiq Global has made it official that its corporate digital services were pulled down offline due to a ransomware attack. The company’s website is offline from early Monday and the web-page notifies that it is down…

How to Retain the Right Kinds of Control in the Cloud

This post was originally published by Jacob Serpa. The last several years have seen an unprecedented shift in the way that businesses conduct their operations and employees perform their work. Users are no longer confined to working on premises from…

How VPNs Keep Your Data Secure

Virtual Private Networks are a pretty important point of contention nowadays. Namely, Internet privacy is being constantly attacked from many directions, leaks are common, and both governments and companies are trying to get their own piece of the pie. Facebook,…

Cyber Attack news trending on Google

Firstly, it is the news related to a Cyber Attack on Redcar and Cleveland Borough Council which is trending on Google. On February 8th, 2020 a ransomware attack targeted the servers of the Redcar and Cleveland Borough Council disrupting the…

InfoSec needs a reputation overhaul

An independent guest blogger wrote this blog. I was in a medical office the other day, and when the doctor came into the room, he needed to unlock his phone to contact a pharmacy.  I couldn’t help but notice that…

Russia criticizes Canada for Cyber Attacks on Georgia

Russia has sharply criticized Canada for blaming Moscow for launching Cyber Attacks on Georgia in 2019. The word comes just after the United States allegedly blamed Kremlin last week for launching cyberattacks on the websites of Georgia and Ottawa joining…

Why vendor management is a cornerstone of security

When it comes to building a security program, one of the most frequently overlooked areas is that of vendor management. Organizations focus significant resources on internal security, such as vulnerability scans, centralized log management, or user training, while not extending…

Google Android 11 OS focuses more on Data Privacy

As Google opened the doors of Android 11 for developers last week the web search giant has insisted that its focus will be more on data privacy for this segment of the operating system. For instance, the upcoming version might…

US Pentagon ethically adopts AI to use in Battlefield

Finally, it’s out that the US Pentagon has decided to use the technology of Artificial Intelligence on the battlefield. However, the usage will be done via ethical practices will utmost judgment and care.   As countries are showing a lot…

Google revamps its Cloud Security measures

Google LLC has made an official announcement at the RSA Conference that it is going to facelift its Cloud Security capabilities of its consumers to protect their data, irrespective of the place where it resides. Thus, with the announcement the…

Cloud Security that Performs

This post was originally published by Nat Kausik. We heard from another customer today that their incumbent cloud security vendor keeps going down. And when it is not down, DLP scans take hours, if they complete at all.   What is…

The Healthcare Breach Report: Breaches on the Upsurge

This post was originally published by Juan Lugo. The vast majority of healthcare organizations utilize and store protected health information (PHI), which is composed of patients’ sensitive information. HIPAA, the privacy rule that classifies PHI, describes protected health information as medical history,…

A new twist on “Parental consent”

An independent guest blogger wrote this blog. I was at breakfast the other day with some family friends, and the topic of genealogy came up.  Over the past few years, various sites have sprouted up that offer to trace your…

Google trending Cyber Attack news headlines

Firstly, it is the US Department of Defense which is topping the headlines when it comes to cyber-attacks. News is out that the systems related to Defense Information Systems Agency(DISA) affiliated to DoD have been hacked the incident reportedly exposed…

Ransomware attack on ISS World

ISS World, a Denmark based company that is into catering, cleaning and security business is reported to have become a victim of a ransomware cyberattack. The company’s website has been inaccessible since Feb 17th of this week and the management…

Is the cybersecurity skills gap real?

An independent guest blogger wrote this blog. If you do a web search for “cybersecurity skills gap,” you’ll get many, many pages of results. It’s certainly a hot topic in our industry. And it’s a matter that security practitioners and…

Ransomware data recovery on Amazon Cloud

Ransomware attacks have become a menace to companies and so Cloudian in association with Veeam has built an Object Storage on Amazon S3 Cloud platform to help companies combat ransomware attacks.   The usage framework is simple to understand- When…

What is a Gen 6 Cyber Attack

As the cyber attack vectors are ever-evolving, it is becoming increasingly challenging for companies and individuals to protect themselves from the dangers lurking in the digital landscape.   Recent research carried out by security researchers of Check Point has concluded…

InfoSec needs a reputation overhaul

An independent guest blogger wrote this blog. I was in a medical office the other day, and when the doctor came into the room, he needed to unlock his phone to contact a pharmacy.  I couldn’t help but notice that…

Cyber Attack result is Coronavirus outbreak

Yes, what you’ve have read is right! There is a talk going on the web that the current outbreak of Coronavirus could be a result of a cyber-attack. Unlike, the ongoing speculation that it was either a result of Chinese…

Ransomware attack on US Gas supply

DHS has issued an advisory yesterday citing a recent ransomware attack on a natural gas supplier as an example that critical infrastructure in the United States was super-vulnerable to cyber attacks. The security advisory has highlighted the fact that companies…

Building comprehensive cybersecurity policies

Image Source: Photo by freestocks.org on Unsplash An independent guest blogger wrote this blog. When you think of cybersecurity, what’s the first thing to come to mind? Most of the time, it might be your business’s IT team, who run…

Why vendor management is a cornerstone of security

When it comes to building a security program, one of the most frequently overlooked areas is that of vendor management. Organizations focus significant resources on internal security, such as vulnerability scans, centralized log management, or user training, while not extending…

Rutters hit by Payment Card Malware

Rutters, the Central Pennsylvania based company which offers a chain of convenience stores and gas stations across Maryland, and West Virginia has released a press statement on Saturday that the Point of Sale (PoS) machines operating in 71 of its…

10 things to know about cybersecurity in 2020

Cybersecurity talent is elusive, resources are dwindling, but hacks are on the rise. We’re addressing these challenges as “must-haves” as we kick off the year is essential to an organization’s cybersecurity strategy. Here are some of the 10 things to…

Do you need certifications to get an InfoSec job?

I’ve seen Tweets and heard many discussions about certifications, like CISSP, CEH, OSCP  and so on, in InfoSec. No doubt certifications have value – in many situations hiring managers are quickly going through resumes and certifications are symbolic of at…

How Smart Cards Work

An independent guest blogger wrote this blog. In this modern age, there’s been a significant improvement in the digitization of traditional payment methods. We live in a technologically advanced era, and as such, advancements in payment infrastructures makes life easier,…

InfoSec needs a reputation overhaul

An independent guest blogger wrote this blog. I was in a medical office the other day, and when the doctor came into the room, he needed to unlock his phone to contact a pharmacy.  I couldn’t help but notice that…

Healthcare security: How can blockchain help?

This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When…

All I want for Christmas is secure IoT gifts!

The holiday season is upon us once more, and in that last-minute scramble to find presents for your loved ones, you may be searching for some more slightly left field ideas. Well, fear not! Our Internet of Things (IoT) gift…

Five key takeaways from European Utility Week 2019

This year’s European Utility Week represented an exciting opportunity for manufacturers and service providers to showcase the latest developments in the utilities space. With so much of the world’s attention rightfully focused on the climate crisis, and especially on reducing the impact of household emissions on the environment, the most…

How to Share Files in a Secure way

When it comes to sharing files, most online users either tend to use email or cloud storage services to send data to and fro. So, this article will help throw some light on the other sharing services which most do…

It is getting harder for us to prove who we are

I had an interesting experience the other day.  I had to renew my driver’s license.  In previous renewal cycles, this was no big deal.  One could just visit the local Department of Motor Vehicles (with a bagged lunch since it…

CES 2020: Tech trends to watch out for this year

This year marks the 53rd annual Consumer Electronics Show (CES) in Las Vegas. And, as seems to be the case very year, this year the show was the biggest and best one yet. With new inventions stretching the imagination and…