Skip to content
securitysifu

SecuritySifu

CyberSecurity And Emerging Technology
securitysifu
  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds

Tag: bcp

Three strategies to prove security's value
Security

Three strategies to prove security’s value

18/11/2020 No Comments bcpcisocyber resiliencedrnotpetyarisk

Security executive Ricardo González doesn’t see IT security as a cost center; instead, he describes it as “a strategic investment in the reduction of corporate…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Three strategies to prove security’s value
Cyberattacks force Louisiana to declare state of emergency
Security

Cyberattacks force Louisiana to declare state of emergency

22/08/2020 No Comments antivirusbcpbitcoincyberattackdatadrransomware

Ransomware and cyberattacks continue to multiply and hit local governments in a scary, escalating pattern such that, now for the second time since 2018, a…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Cyberattacks force Louisiana to declare state of emergency
What Do You Do When A Meteor Hits The Building?
Security

What Do You Do When A Meteor Hits The Building?

19/08/2020 No Comments bcpbusiness continuitydisaster recoverydrmfapassword

Over the years I have had the benefit of working as a security practitioner in numerous corporate environments, not as a consultant but as a…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More What Do You Do When A Meteor Hits The Building?
Facebook, Instagram, and WhatsApp repaired without a real explanation
Security

Facebook, Instagram, and WhatsApp repaired without a real explanation

04/07/2020 No Comments bcpdrfacebookinstagramwhatsapp

For most of July 3, Facebook Facebook’s sister image-sharing network, Instagram and its popular communications program WhatsApp were having fits. None of the sites were…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Facebook, Instagram, and WhatsApp repaired without a real explanation
FACEBOOK DOWN: SITE AND APP STOPS SHOWING PHOTOS AS USERS ALSO REPORT ISSUES WITH WHATSAPP
Security

Facebook Down: Site And App Stops Showing Photos As Users Also Report Issues With Whatsapp

23/06/2020 No Comments bcpdisaster recoveryfacebookwhatsapp

Facebook has stopped working properly, at the same time as WhatsApp. Rather than a total or global outage, the Facebook issue appears to be specific to certain…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Facebook Down: Site And App Stops Showing Photos As Users Also Report Issues With Whatsapp
Cybersecurity in the “When-Not-If” Era
Security

Cybersecurity in the “When-Not-If” Era

18/06/2020 No Comments bcpcisocyber resiliencedisaster recovery

Many large organizations now assume that breaches are simply inevitable due to the inherent complexity of their business models and the multiplication of attack surfaces…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Cybersecurity in the “When-Not-If” Era
6 questions to consider before implementing a disaster recovery plan
Security

6 questions to consider before implementing a disaster recovery plan

04/04/2020 No Comments bcpbusiness continuitydisaster recoverydr

DRP’s are about backing up data and recovering from loss as efficiently as possible, but a plan is only as good as its weakest link.…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More 6 questions to consider before implementing a disaster recovery plan

RSS Feeds

  • (ISC)² Opens Call for Expert Cybersecurity Speakers for 2021 Security Congress
  • The UK's Next Steps on Cybersecurity
  • DHS looking for industry ideas on finding and keeping cyber talent
  • NeuVector Wins Cyber Security Global Excellence Award as a Top Container Security Solution
  • Top Trends in In-House IT Security
  • Cyber attack at Lakehead University remains unexplained
  • Alion Chief Information Security Officer Jim Rigney Named a Top 10 CISO to Watch in 2021 By ...
  • US teases retaliation over state-backed cyber attacks
  • UK cybersecurity spending on the rise despite pandemic-induced budget cuts
  • How Will This New Cybersecurity ETF Respond to the Microsoft Hack?

Recent Vulnerabilities

SolarWinds hackers studied Microsoft source code for authentication and email – The Edge Markets MY

09/03/2021 No Comments
What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?

What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

03/10/2019 No Comments
Nearly 60% of businesses suffered a data breach in the past 3 years

Nearly 60% of businesses suffered a data breach in the past 3 years

03/10/2019 No Comments
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

04/10/2019 No Comments
APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence

07/10/2019 No Comments
No comments found.
0day 2fa 4g abuse access control account admin adware aerospace agile ai amazon analytics android anonymity anonymous antivirus api app apple application security appsec apt art artificial intelligence assessment atm attachment attack audit authentication automation autonomous vehicles autopilot aws azure backdoor backup bcp bgp big data biometric bitcoin block blockchain blue team bluekeep bluetooth bot botnet breach breached browser brute force bug bug bounty business business continuity business impact byod camera capsule network cars casino censor cert certificate china chipset chrome cia cio cisco ciso click fraud cloud cnc code code signing compliance container cookie corona covid-19 crack credential stuffing credentials credit card crime critical infrastructure crypto cryptocurrency cryptography cryptojacking cryptomining currency cve cvss cyber cyber attack cyber defense cyber espionage cyber insurance cyber resilience cyberattack cybercrime cybersecurity cyberthreat cyberwarfare cylance darknet darkweb data data breach data leak database ddos debug decryption deepfake deepweb defcon detection devops devsecops diabetes dictionary attack digital digital forensics digital signature disaster recovery diy dkim dmarc dns docker domain doos dos dr e-commerce ecommerce edge computing email emotet encryption encryption keys enigma equifax espionage eternalblue ethereum european union exif exploit extortion facebook facial recognition fake fbi fileless firefox firewall forensics framework fraud ftp fuzzing gdpr git github gmail goldbrute google governance gps grc hack hacked hacker hacktivism hacktivist hash hijack hipaa honeypot hosting hsm https huawei hybrid cloud iam ibm ics identity incident incident handling incident management incident response india industrial control system information security infrastructure injection insider threat instagram insurance intel intelligence internet ioc ios iot ip ipad iphone isms iso iso 27001 iso27000 isp jailbreak kasperksy Kaspersky key keylogger kgb kubernetes law lawsuit leak legal libra linux lock lte mac machine learning malvertising malware managed security medical devices meltdown mfa microprocessor microsoft military mimikatz mirai misconfiguration mitm mitre mobile mobile app mongodb monitor mozilla mssp multi cloud music nasa netcat network nfc nosql notepad notpetya nsa office open source openssl operating system owasp password patch payment pdf penetration test personal information pgp phishing phone php pii pin plugin policy ponzi porn power grid powershell privacy private keys privilege access program programmer protection proxy python quantum ransomware raspberry pi rat rce rdp red team remote code execution response risk router rsa russia s3 saas satellite scada scam script security security awareness self driving car server serverless sextortion sha shell side channel skim smart city smart device smart home smart tv smartphone sms sniff soc social engineering social media software spam spear phishing spectre spf spoof spy spyware sql sqlite ssh ssl standard startup steganography storage stuxnet supply chain surveillance tcp teamviewer telegram tesla testing threat tls token tor trend trojan unix usa usb video virus vmware voice voip vpn vulnerability waf wannacry web website whatsapp whitehat wi-fi wifi wikileaks windows wipro wireless wordpress worm xss yubikey zero day zero trust zoom

Recent Posts

  • SolarWinds hackers studied Microsoft source code for authentication and email – The Edge Markets MY
  • IOTW: End-Of-Life Third Party Software Responsible For Singtel Hack – Cyber Security Hub
  • Warner wants answers on Florida water utility hack – GCN.com
  • Ransomware gangs are running riot — paying them off doesn’t help – GCN.com
  • CISA eyes changes to combat future supply chain hacks – FCW.com

Trending

cisco credit card privilege access cyber resilience currency linux machine learning kubernetes rce incident response proxy rsa password container capsule network amazon microsoft policy military multi cloud
Follow Us

Search…

  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds
SecuritySifu | © Copyright All right reserved
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.