Category Archives: News

  • Campus Cybersecurity 101

    Posted on April 13, 2018 by in News, Security

    The proliferation of personal mobile devices and homegrown hackers on today’s campuses—not to mention the open, collaborative nature of college environments in general—make cybersecurity particularly challenging in higher education. It’s no wonder cybercriminals consider colleges and universities easy targets. Once a breach in a university’s network occurs, the entire campus can be vulnerable. That’s why […]

    Comments Off on Campus Cybersecurity 101 Continue Reading...
  • US Firms Still Unprepared for Looming Data Privacy Rules

    Posted on April 6, 2018 by in News

    U.S. financial services firms trying to manage regulations and guidance on data protection and cyber security from multiple jurisdictions, are about to face one of their biggest challenges yet when strict new European Union rules governing the use of personal information take effect.A mobile phone simulating a call to German Chancellor Angela Merkel next to […]

    Comments Off on US Firms Still Unprepared for Looming Data Privacy Rules Continue Reading...
  • Intel Redesigns Processors to Patch “Meltdown” Flaws

    Posted on March 16, 2018 by in News

    “100% Patch” As promised, Intel has redesigned its upcoming 8th-gen Xeon and Core processors to further reduce the risks of attacks via the Spectre and Meltdown vulnerabilities, CEO Brian Krzanich wrote. Those fixes are on top of the software updates already issued, which now patch “100 percent” of vulnerable Intel products launched in the past […]

    Comments Off on Intel Redesigns Processors to Patch “Meltdown” Flaws Continue Reading...
  • 10 Ways to Snuff out Spear Phishing

    Posted on March 8, 2018 by in News

    Spear Phishing What is spear phishing?   To define spear phishing, you first have to understand the concept of phishing. Phishing: is an online con game using social engineering and fear tactics in order to get the victim to take the bait. This can be via cold calls, pop-up messages on the computer, text messages […]

    Comments Off on 10 Ways to Snuff out Spear Phishing Continue Reading...
  • Endpoint Devices: The New Battleground for Public Sector Cybersecurity

    Posted on February 23, 2018 by in News

    In the quest for secure systems, there is still one important weak point that many private and public sector organizations are still overlooking: endpoint devices. These are devices such as PCs, printers, scanners, Voice over Internet Protocol (VoIP) phones and smart meters, which carry important and private information from both staff and citizens. Though these […]

    Comments Off on Endpoint Devices: The New Battleground for Public Sector Cybersecurity Continue Reading...
  • Phishy Issue: OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate

    Posted on February 16, 2018 by in News

    You may not be a bit coin miner or own any cryptocurrency, but you could definitely be a target for spear phishing. If there’s anything constant in the ever-evolving technology and threat landscapes, it’s that no platform will be truly immune. Cryptocurrency-mining malware, for instance, first gained ground on Windows systems then went to affect […]

    Comments Off on Phishy Issue: OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate Continue Reading...
  • Hilarious and Heartwarming Surveillance Videos

    Posted on February 9, 2018 by in News

      It’s Friday – how about some levity? We live in a world where surveillance is everywhere. Municipalities have cameras on street corners. Banks are surrounded by cameras. University campuses are covered. Retailers are watching customers and employees. Indeed, thanks to the lowered price of surveillance solutions, a heightened need for surveillance and improved capabilities, […]

    Comments Off on Hilarious and Heartwarming Surveillance Videos Continue Reading...
  • Spectre/Meltdown Vulnerability Updates from Multiple Vendors

    Posted on January 16, 2018 by in News, Security

    From the January 2018 CSB Newsletter: Spectre and Meltdown Vulnerabilities  The Spectre and Meltdown vulnerabilities affect Intel, AMD, Qualcomm and ARM processors used by almost all computers. These hardware bugs allow programs to steal data which is currently processed on the computer. Apple, Google, Microsoft, VMware and other companies have released updates to patch these […]

    Comments Off on Spectre/Meltdown Vulnerability Updates from Multiple Vendors Continue Reading...
  • Barracuda Utilizing “Artificial Intelligence”

    Posted on January 12, 2018 by in Cloud, News, Security

    Is Artificial Intelligence real? Most people would say “yes” because they’ve heard and read about it so often. But is it really “intelligence”? Supervised Machine Learning is what Barracuda has harnessed for their Sentinel offering. It can classify data, determine if it’s good or bad, human or robot and react accordingly based on the algorithm […]

    Comments Off on Barracuda Utilizing “Artificial Intelligence” Continue Reading...