cybersecurity

Google Releases Report on Software Supply Chain Security

Google Releases Report on Software Supply Chain Security

In response to a rising number of software supply chain attacks, Google has released a public report, Perspectives on Security. The report documents the latest security vulnerability trends and how best to address them. The report comes on the second anniversary of the SolarWinds attack, which cost nine federal agencies and over 100 private companies USD 100 billion to clear up.

CloudSEK Employee’s Jira Credentials Stolen through a Compromised Company Laptop

CloudSEK Employee’s Jira Credentials Stolen through a Compromised Company Laptop

CloudSEK, an Indian cybersecurity firm, has announced that cybercriminals have gained access to its Confluence documents and the Jira account of a compromised employee. The cybercriminal is claiming to offer up sensitive CloudSEK information on darknet forums including XVigil, ProjectX, Codebase, Jira, email, and social media accounts. CloudSEK refuted the cybercriminals’ claims, admitting threat actors had compromised only three customer purchase orders and information.

Zero Knowledge Mitigates GoTo & LastPass Security Breach, Proves Its Worth

Zero Knowledge Mitigates GoTo & LastPass Security Breach, Proves Its Worth

GoTo, (formerly LogMeIn), has issued a formal security breach notification through its blog, indicating that cybercriminals have gained access to its development environment and cloud storage facilities. LastPass, a subsidiary of GoTo, has also issued a similar update to customers. However, no passwords have been stolen and little or no sensitive data has been leaked, as of the present time.

An Introductory Guide to the Point-to-Point Tunneling Protocol (PPTP)

An Introductory Guide to the Point-to-Point Tunneling Protocol (PPTP)

When you set up a VPN on a router, firewall, operating system (OS), or security solution, it’ll ask you to choose a VPN protocol. Some of these protocols are fairly new. Others are decades old. One of these ancient VPN protocols is the Point-to-Point Tunneling Protocol, or PPTP for short. This post looks closely at PPTP, one of the fastest and oldest VPN protocols. We’ll talk about what it is, how it works, its benefits, its disadvantages, and more.

5 Must-Have Email Security Policies for Your Business

5 Must-Have Email Security Policies for Your Business

Although the average person may not encounter a substantial amount of emails, businesses and people within these businesses use email every day. Unfortunately, cybercriminals often use this common messaging tool as an attack vector. In this article, you’ll learn everything you need to know about email security policies. You’ll also learn about the 5 policies you simply can’t ignore as well as some tips for creating an email security policy document.

Report Shows Data Science Will Be in Demand for 2023

Report Shows Data Science Will Be in Demand for 2023

Data science is a cross between different sectors. The demand for it proves the need for skill diversity for future tech employees. Mastering one skill isn’t enough anymore. To make it in tech, employees need to combine their basic skills with other advanced skills.

Scroll to Top