Skip to content
Monday, January 18, 2021

Ken Gilmour

Curated News Feeds

  • Home
  • Hacktivism
  • Strategic Threats
  • Cyber Crime
  • Security Blogs
  • Economic Threats
  • Free Cyber Tools!
Home>Archive by Category Cybersecurity-Covid-19

Category: Cybersecurity-Covid-19

Security guard avoided Manchester Arena bomber for fear of being called racist

October 27, 2020 Cyber Crime Monitoring Bot15

via theguardian.com Kyle Lawler had a ‘bad feeling’ about Salman Abedi but ‘did not have anything to justify that’A security guard had a “bad feeling” when he saw Manchester Arena suicide bomber Salman Abedi but did not approach him for fear of being b…

Continue Reading

Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy

October 27, 2020 Economic Threats Monitoring Bot13

Introduction Start your free trial I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, lookin…

Continue Reading

Chinese Attackers’ Favorite Flaws Prove Global Threats, Research Shows

October 27, 2020 Strategic Intel Monitoring Bot15

The 25 vulnerabilities most commonly scanned for and targeted by Chinese nation-state attackers were exploited seven times more often than other flaws in the past six months, researchers report in their analysis of a list published by the US National S…

Continue Reading

Trey Grayson on the reliability of the American election system

October 27, 2020 Strategic Intel Monitoring Bot17

Elections have become a polarised, partisan issue. Democrats accuse Republicans of suppressing voter turnout by curbing mail-in ballots during the pandemic; Republicans respond with allegations of fraud. Both sides can point to individual examples to s…

Continue Reading

BYOD, Cybersecurity, and Remote Work: How They All Fit Together

October 27, 2020 Economic Threats Monitoring Bot12

How do BYOD, cybersecurity, and remote work all interact and intersect in business IT environments? Bring-Your-Own-Devices (BYOD) refers to employees using personal devices including laptops and mobile devices. Originally, BYOD offered enterprises a ne…

Continue Reading

CISA’s Krebs: The US will win 5G race because ‘we own the cloud space’

October 27, 2020 Strategic Intel Monitoring Bot16

Written by Oct 27, 2020 | FEDSCOOP. Billy Mitchell Many projections place China ahead of the U.S. in the development of 5G wireless networks. But according to Chris Krebs, director of the Cybersecurity and Infrastructure Security Agency , the U.S. actu…

Continue Reading

NDAA for FY 2021 Will Include Numerous Provisions Affecting Acquisition Programs and Cybersecurity Requirements

October 27, 2020 Strategic Intel Monitoring Bot17

Congress is currently negotiating the final version of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2021, which sets funding levels and outlines policy priorities for the U.S. Department of Defense (DOD). Given the law’s size and …

Continue Reading

LogMeIn By LastPass Reveals New State of Remote Work

October 27, 2020 Hacktivist Monitoring Bot17

LogMeIn by LastPass today released findings of a new LogMeIn Central report entitled “The Surprising New State of IT in a Remote World: Tackling Challenges and Redefining IT for Future Success.” As befits the title, this report explores the current sta…

Continue Reading

Ping Identity Appoints Emma Maslen to Lead EMEA and APAC Growth

October 27, 2020 Auto Bot11

via infosecurity-magazine.com Ping Identity Appoints Emma Maslen to Lead EMEA and APAC GrowthIdentity security firm Ping Identity has announced the appointment of Emma Maslen as its vice-president and general manager for EMEA and APAC. In this role, sh…

Continue Reading

Leading Fintech Companies Predict Phenomenal Growth in Contactless Cards and Touchless Commerce across America in 2021

October 27, 2020 Economic Threats Monitoring Bot8

. Join some of the nation’s top innovative tech leaders October 29th 3pm ET as we discuss the future of payments in America and how to enable the nation’s economic recovery.

PHILADELPHIA Oct. 27, 2020 /PRNewswire/ — With brick and mortar retail, hosp…

Continue Reading

Posts navigation

Older posts

Free SIEM tool

  • img1.jpg

Recent Articles

  • ‘Nuclear blast in cyberspace’ January 18, 2021
  • Cybersecurity tips for businesses to prepare for the next holiday period January 18, 2021
  • Cyber Threat From Electric Vehicles Cannot Be Ignored | Hacker Noon January 18, 2021
  • #ransomware | #computerhacker | LETTER: Protecting Canada’s vaccine supply against ransomware | Regional-Perspectives | Opinion January 18, 2021
  • The 9 best cyber security courses | IT PRO – IT PRO January 18, 2021
  • THREATS TO INTERNET SECURITY: TYPES AND PROTECTION METHODS January 18, 2021
  • Parler’s website re-surfaces with message from CEO John Matze to the ‘lovers and haters’ January 18, 2021
  • Private Cyber Warfare || A Dark Side of the Moon Story January 18, 2021
  • AI likely to replace humans in cybersecurity space by 2030 – The Tribune January 18, 2021
  • New coalition aims to combat growing wave of ransomware attacks | TheHill – The Hill January 18, 2021

About This Site

This site is provided free, as is, without support and without ads. It is useful for Security teams who need to keep up to date with Infosec news. Information is automatically fetched and there is no guarantee of accuracy on any content on this site.

Search

Most active Tags

APTFilter AVGNews CERT-LatestNews FSecureNews KasperskyNews Malware McAfeeNews SocialEngineering SophosNews SymantecNews ThreatsActivists ThreatsCybercrime ThreatsEconomic ThreatsStrategic TrendMicroNews VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApple VulnerabilitiesApplications VulnerabilitiesCisco VulnerabilitiesCrypto VulnerabilitiesDBMS VulnerabilitiesFirmware VulnerabilitiesGoogle VulnerabilitiesHardware VulnerabilitiesLinux VulnerabilitiesMicrosoft VulnerabilitiesMozilla VulnerabilitiesNetwork VulnerabilitiesOracle VulnerabilitiesOS VulnerabilitiesVMWare VulnerabilitiesVOIP
Copyright 2020 - Ken Gilmour
  • Attribution
  • Where I work