September 19, 2022

CyberOwl wins award from Singapore government to develop innovative solutions protecting maritime systems

CyberOwl, a specialist in cyber risk management of maritime and offshore systems, has won an award by the Cyber Security Agency of Singapore (CSA) to further innovate solutions protecting shipboard assets, working together with industrial end user partner, Eastern Pacific Shipping. The innovation will focus on “decentralising” cyber risk management, so that the crew can ensure safe and secure …

CyberOwl wins award from Singapore government to develop innovative solutions protecting maritime systems Read More »

Software supply chain security is coming of age

Coalfire’s first Securealities Software Supply Chain Risk Report revealed dramatic budget increases for enterprise security in general and a growing demand for more testing, training, and process improvements in the battle to defend digital assets. But perhaps the most significant takeaway from the report is the rise in executive-level risk awareness of the need to …

Software supply chain security is coming of age Read More »

#WSPD Creating hope through action with The Jordan Legacy

*TW: Mentions Suicide Our passion for protecting people doesn’t stop with online safety. We deeply care for our people, their families and friends, and our communities. To recognize World Suicide Prevention on Sept. 10 and help normalize and encourage conversations about mental health year-round, we recently hosted a discussion with McAfee colleagues and suicide prevention …

#WSPD Creating hope through action with The Jordan Legacy Read More »

In a commoditised world, where is individual privacy?

The Indian government’s guidelines for virtual private network (VPN) providers came into force on 25 September, 2022. They mandate, among other things, storing users’ personal data for up to five years. At least three VPN service providers have already left India or shut down their servers here because the provisions harm user privacy. Recent Indian …

In a commoditised world, where is individual privacy? Read More »

EP84 How to Secure Artificial Intelligence (AI): Threats, Approaches, Lessons So Far

Subscribe at Google Podcasts. Subscribe at Spotify. Subscribe at Apple Podcasts. Guest: Alex Polyakov, CEO of Adversa.ai Topics covered: Resources: “EP52 Securing AI with DeepMind CISO” (ep52)“EP68 How We Attack AI? Learn More at Our RSA Panel!” (ep68)Adversarial AI attacks work on Humans (!)“Maverick* Research: Your Smart Machine Has Been Conned! Now What?” (2015)“The Road …

EP84 How to Secure Artificial Intelligence (AI): Threats, Approaches, Lessons So Far Read More »

Protect Your Social Media Accounts from Hacks and Attacks

Here’s to the hashtags, the likes, the followers, the DMs, and the LOLs—June 30th marks Social Media Day, a time to celebrate and reflect on how social media has changed our lives over the years.  Started in 2010 by media and entertainment company Mashable, celebrations have taken on all kinds of forms. Meetups, contests, calls to increase your social circle …

Protect Your Social Media Accounts from Hacks and Attacks Read More »

Beyond Zero Trust: a Modern Defense Approach

The author John Steinbeck famously said, “If you find yourself in a fair fight, your tactics suck.” This is true whether your threat landscape is real or digital. When  you look at the cyberthreat landscape, it is clear our adversaries have foisted an unfair fight on us, and it is only getting worse.Read more

Seven Differentiators of Alluvio IQ Unified Observability Service

What sets Alluvio IQ apart from other observability solutions? We end our customer presentation with a list of Alluvio IQ’s key differentiators that make Alluvio IQ’s ecosystem “a big deal,” according to a recent analyst briefing with IDC. With that in mind, here are the ones IDC also considers important for standing out in the …

Seven Differentiators of Alluvio IQ Unified Observability Service Read More »

Seven Differentiators of Alluvio IQ Unified Observability Service

What sets Alluvio IQ apart from other observability solutions? We end our customer presentation with a list of Alluvio IQ’s key differentiators that make Alluvio IQ’s ecosystem “a big deal,” according to a recent analyst briefing with IDC. With that in mind, here are the ones IDC also considers important for standing out in the …

Seven Differentiators of Alluvio IQ Unified Observability Service Read More »

Analysis and Remediation Guidance of CSRF Vulnerability in Csurf Express.js Middleware

Technical Summary On 28th of August fortbridge.co.uk reported a vulnerability in csurf middleware – expressjs supporting library that enables CSRF protection in expressjs. As of 13th of September csurf library has been deprecated with no plans to fix the vulnerabilities. There is no viable alternative for csurf middleware now. Am I Affected? All versions of csurf library …

Analysis and Remediation Guidance of CSRF Vulnerability in Csurf Express.js Middleware Read More »

Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine

Editors Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF. This report profiles the unique infrastructure used by the threat activity group UAC-0113, which is linked with moderate confidence by CERT-UA to Sandworm. The activity was identified through a …

Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine Read More »

Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine

Editors Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF. This report profiles the unique infrastructure used by the threat activity group UAC-0113, which is linked with moderate confidence by CERT-UA to Sandworm. The activity was identified through a …

Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine Read More »