Hong Kong Broadband Network Exposes Data of 380,000 Customers
Jeff Edwards | | Security
The personal data of 380,000 customers of Hong Kong Broadband Network (HKBN), has been hacked, according to a statement from the company.
Jeff Edwards | | Security
The personal data of 380,000 customers of Hong Kong Broadband Network (HKBN), has been hacked, according to a statement from the company.
Adam Bertram | | Security
Logging into MOVEit's console or web interface works great for day-to-day management tasks or setting up one-time workflows but there are times when we need to automate with MOVEit Automation!
You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and domestic consumers using IoT devices that lack fundamental layers of security. This...
Adam Bertram | | IT Insights | Security
Large organizations typically have lots of devices that require IP addresses. Client desktops, tablets, mobile and desk phones, servers and more all consume IPs. The only way to manage IPs at this level is to use Microsoft Dynamic Host Configuration Protocol (DHCP),...
Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.
Increased use of cloud applications and other developments are transforming WAN implementations, improving security in the process.
Jeff Edwards | | Security
Just last week, we were looking back at the most significant hacks and attacks of 2017, and wondering what lay ahead for 2018. Well, wonder no more.
Remember the corporate accounting scandals that took out Enron, Arthur Andersen and WorldCom? They all ended with prison sentences, layoffs, and billions of investor dollars lost forever.
Security information and event management (SIEM) software provides a way to track, integrate, and analyze the vast amount of log data that comes from an organization’s applications and network hardware. Its original value came from compliance reporting, but it is...
This infographic is a great place to start getting acquainted with the 7 principles of data protection and what they mean for data in transit.
The cybersecurity skill gap is a growing problem in the IT industry. Simply, the skill shortage needs to be fixed in order to fight the growing cybersecurity threat landscape.
The blockchain is a disruptive technology, and its implications are not fully understood yet. Here is how the blockchain could change the audit world.
Kevin Conklin | | Cloud | Cloud Computing | Security
The cloud can be just as secure as on-premise, but a comprehensive defensive framework is essential.
For Windows IT professionals, perhaps the most popular set of troubleshooting tools is Sysinternals, the creation of none other than Mark Russonivich, Microsoft’s CTO of Azure.
Greg Mooney | | Security
The spiritual successor to the Mirai botnet is now looming inside millions of IoT devices. Will it wreak havoc on the Internet, or can we stop it in its tracks?
Chances are cyber criminal already have all your personal data. Now is the time to up your game with this series of 10 Hacks for Safer Cyber Citizenship.
Monica Gupta | | Security
Each MOVEit deployment option promises to securely transfer your sensitive data from point A to point B. While one option isn’t better than the others, one may fit you best.
Kevin Howell | | Security
The IoT presents unique security challenges that enterprises will have to solve fast.
Greg Mooney | | Security
Permanent patches sometimes take months to deploy—leaving digital assets open to attack. That's where virtual patching comes into play.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.