Cisco Patches Critical Flaw in Vision Dynamic Signage Director

Cisco this week released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability that could allow attackers to execute arbitrary actions on the local system.  Tracked as CVE-2019-1917, the vulnerability was found in the REST API interface of Vision Dynamic Signage Director and could be exploited by an unauthenticated, remote attacker to bypass authentication on an affected system. “The vulnerability is due to insufficient validation…

July 20, 2019
Read More >>

Cybersecurity: Drones Will Soon Become Both Predator and Prey

In the coming years, commercial drones will become a predator controlled by attackers to conduct targeted assaults on business. Drones will become smaller, more autonomous with increased range and equipped with cameras for prolonged surveillance missions. Flying in close proximity to operating environments, they will also be used to conduct advanced man-in-the-middle attacks, degrade mobile networks or spoof and jam other signals. Conversely, drones will become prey as they are…

July 19, 2019
Read More >>

The Automotive Industry: Stepping up on Defense

We are midway through 2019, and automotive hacks continue to rise. The global market for connected cars is expected to grow by 270% by 2022, with more than 125 million passenger cars with embedded connectivity forecast to ship worldwide by 2022. The amount and quality of data is only destined to grow as manufacturers add more technology into the driver and the passenger experience, especially as we approach a time…

July 19, 2019
Read More >>

Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics

Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing. Enterprise infrastructures are much more complex today than even a few years ago. In a bid to optimize processes and maximize profits, businesses are deploying cloud services, IoT and mobile solutions at an unprecedented rate. Keeping pace with digital demands can result in an expanded attack surface. This means cybersecurity chiefs need an approach that…

July 19, 2019
Read More >>

Today’s Top Public Cloud Security Threats …And How to Thwart Them

Many enterprises today have inadvertently exposed proprietary information by failing to properly secure data stored in public cloud environments like AWS, Azure, and GCP. And while cloud computing has streamlined many business processes, it can also create a security nightmare when mismanaged. A simple misconfiguration or human error can compromise the security of your organization’s entire cloud environment. Whether your whole business or small portions operate in the cloud, it’s…

June 21, 2019
Read More >>

Influence Operation Uses Old News of New Purposes

A recently uncovered influence campaign presents old terror news stories as if they were new, likely in an attempt to spread fear and uncertainty, Recorded Future reports.  Dubbed Fishwrap, the operation uses 215 social media accounts that leverage a special family of URL shorteners to track click-through from the posts. At least 10 shortener services are used, all of which run the same code and are hosted on the same commercial…

June 18, 2019
Read More >>

Spring Cleaning: Why Companies Must Spring Clean Out Their Social Media Accounts This Season

Every year around this time, we collectively decide to open the windows, brush off the dust, and kick the spring season off on a clean foot. But as you are checking off your cleaning to-dos, be sure to add your social media profiles to that list. It’s obvious that social media profiles hold sensitive personal data but letting that information and unknown followers pile up can put your company, customers…

June 14, 2019
Read More >>

Building Modern Security Awareness with Experiences

Experiences and events, the way that I define them, are segments of time in which a learner is more actively engaging in an element of your program. At their best, “experiences” should be well, experiential, requiring active participation rather than passively watching or paging through a Computer Based Training module. But, that’s not necessary to be considered an experience. I generally consider anything like a meeting, a webinar, a lunch-and-learn,…

June 14, 2019
Read More >>

The Promise and Perils of Artificial Intelligence

Many companies use artificial intelligence (AI) solutions to combat cyber-attacks. But, how effective are these solutions in this day and age? As of 2019, AI isn’t the magic solution that will remove all cyber threats—as many believe it to be. Companies working to implement AI algorithms to automate threat detection are on the right track; however, it’s important to also understand that AI and automation are two entirely separate things….

June 14, 2019
Read More >>

Utilising the Benefits of Industrial Robots Securely

Jalal Bouhdada, Founder & CEO at Applied Risk, discusses the rise of industrial robotics and how we can increase the cyber resilience of production environments in the future. It is increasingly likely that a factory worker today will find themselves employed as part of a diverse workforce, one which includes industrial robots. That is because the industry is rapidly gaining popularity, so much so that it is expected that 4…

June 5, 2019
Read More >>