Day: November 2, 2021

IBM to acquire ReaQta to expand its cybersecurity threat detection and response offerings

IBM Security announced an expansion of its cybersecurity threat detection and response capabilities with its plans to acquire ReaQta. ReaQta’s endpoint security solutions are designed to leverage AI to automatically identify and manage threats, while remaining undetectable to adversaries. This move will expand IBM’s capabilities in the extended detection and response (XDR) market, aligning with …

IBM to acquire ReaQta to expand its cybersecurity threat detection and response offerings Read More »

Digi International acquires Ventus Holdings to simplify enterprise WAN management

Digi International announced it has acquired Connecticut-based Ventus Holdings, a provider of Managed Network-as-a-Service (MNaaS) solutions that simplify the complexity of enterprise wide area network (WAN) connectivity. The acquisition—the largest in Digi’s 36-year history—will enable the company to provide software and subscription service plans along with its award-winning hardware, thereby strengthening its position as a …

Digi International acquires Ventus Holdings to simplify enterprise WAN management Read More »

Rockwell Automation acquires AVATA to expand supply chain services

Rockwell Automation announced that it has acquired AVATA, a services provider for supply chain management, enterprise resource planning, and enterprise performance management solutions. AVATA has significant domain expertise in enterprise applications and is a leading consultant and systems integrator for Oracle cloud software applications. By significantly improving end-to-end supply chain visibility and management, AVATA, together …

Rockwell Automation acquires AVATA to expand supply chain services Read More »

Security considerations when developing and managing your website (ITSAP.60.005)

Threat examples The list below includes some common threats to be aware of when developing and maintaining your website. Injection attacks: A general term for any exploitation in which a threat actor provides an untrusted input (e.g. injects malicious code) into a system to modify operations or data. Cross-site scripting (XSS) attacks: A threat actor …

Security considerations when developing and managing your website (ITSAP.60.005) Read More »

Web Machine: (N7)

Here you can download the mentioned files using various methods. We have listed the original source, from the author’s page. However, after time these links ‘break’, for example: either the files are moved, they have reached their maximum bandwidth limit, or, their hosting/domain has expired. For these reasons, we have been in touch with each …

Web Machine: (N7) Read More »

[tl;dr sec] #108 – How SolarWinds is Securing their Supply Chain, Cloud Security Tooling, Risk-based Security Decision Making

Hey there, I hope you’ve been doing well! You’re Enough Happy Halloween! 🎃 I hope you had a festive and fun weekend. I mostly just stayed in, relaxed, and watched Dune with a few friends. I wanted to share how I spent my weekend, because TV, movies, and pop culture can set pretty high expectations. …

[tl;dr sec] #108 – How SolarWinds is Securing their Supply Chain, Cloud Security Tooling, Risk-based Security Decision Making Read More »

'I Want to Help Prevent Crime From Happening in the First Place'

As of this summer, digital safety has been embedded in Norwegian society. Not only has the legislation been amended, but the curriculum of schools now includes it as an integral part. This is all thanks in part to Mia Landsem. She used to be a semi-professional gamer, then unwittingly found her nude photos online, and …

'I Want to Help Prevent Crime From Happening in the First Place' Read More »

US Treasury Department Says Stablecoins Must Be Regulated

Report Calls for Congressional Action to Address Risks With Fiat-Backed TokensA new report from the U.S. Treasury Department urges Congress to “act promptly” to issue legislation that brings additional oversight to stablecoins, or crypto tokens pegged to fiat currencies. Federal officials say regulation should match that of traditional financial institutions – as a way to …

US Treasury Department Says Stablecoins Must Be Regulated Read More »

7 Trends: How Ransomware Operations Continue to Evolve

New Players and Rebranding Remain Constant, as Does Challenge of Operating AnonymouslyWhile ransomware remains many criminals’ weapon of choice for reliably shaking down victims, the ransomware-attacker landscape itself continues to evolve in numerous ways, with a constant influx of fresh players, regular rebranding, as well as the challenge of cashing in cryptocurrency while staying anonymous.Read …

7 Trends: How Ransomware Operations Continue to Evolve Read More »