Contact
(877) 747-7959
info@sofiaitc.com

News

Congressional Committee Wants Nuance to Share NotPetya Details (InfoRiskToday)

Anti-Malware , Risk Management , TechnologyWants Transcription Company to Help Identify Lessons Learned Marianne Kolbasuk McGee (HealthInfoSec) • October 23, 2017     A House committee is requesting a briefing with medical transcription services vendor Nuance Communications to ...

ROCA 'round the lock: Gemalto says IDPrime .NET access cards bitten by TPM RSA key gremlin (The Register)

Here's what to do if you have an affected badge Some Gemalto smartcards can be potentially cloned and used by highly skilled crooks due to a cryptography blunder dubbed ROCA. Security researchers went public last week with research that revealed that RSA keys produced for smartcards, security tokens, and other devices by crypto-chips made by Infineon Technologies were weak and ...

EU ePrivacy Regulation Edges Closer to Fruition (SecurityWeek)

The proposed European Union ePrivacy Regulation is on the verge of entering Trilogue. Trilogue is the series of informal discussions involving the European Parliament, the Council of Europe (that is, representatives from each member state), and the European Commission. It is Trilogue that defines the final shape of the legislation. The all-important hurdle was the vote by 31 in favor to ...

5 Reasons Why VoIP Disaster Recovery Is Critical for Your Business (IT Toolbox Blogs)

Hurricanes, earthquakes, and other natural and man-made disasters create situations that demand a solid business continuity (BC)/disaster recovery (DR) plan in case of serious interruptions to your organization’s business. This article focuses on BC/DR for your voice over IP (VoIP)/unified communications (UC) business phone system. The year 2017 has been a busy year for hurricanes in ...

2 Ways VoIP Makes Communication More Flexible (IT Toolbox Blogs)

Flexible has quickly become a buzzword that many businesses use to describe themselves. It makes sense because both the marketplace and new technologies create change at such a rapid pace that businesses need to adapt. For businesses to become flexible, they need to ensure that the tools they rely on to get things done are flexible, ...

The Benefits of Remote Access CCTV for your Home (IT Toolbox Blogs)

There is a good reason why people are in so much debt these days. They can't help spending money on possessions that end up gathering dust. All this recklessness is definitely good for burglars. Homes have become a lot more appealing to break into. It's why remote access CCTV cameras have become popular in recent ...

Reaper botnet looming, but not yet landed. CyCon phishing. How to troll for influence.

Download Audio

Russian Spies Lure Targets With NATO Cybersecurity Conference (SecurityWeek)

A cyber espionage group linked to Russia has been trying to deliver malware to targeted individuals using documents referencing a NATO cybersecurity conference, Cisco’s Talos research team reported on Monday. The attack has been linked to the notorious threat actor known as APT28, Pawn Storm, Fancy Bear, Sofacy, Group 74, Sednit, Tsar Team and Strontium. The campaign was apparently aimed at individuals ...

4 Common ERP Security Problems You Can Avoid (IT Toolbox Blogs)

It may not seem like a treasure trove of information that malicious hackers would find useful, but your enterprise resource planning (ERP) solution provides information that just about every brand of attacker would love to get his or her hands on. The cyber-criminal may be lured by the financial, accounting, human resources, and e-commerce data stored ...

Is Your ERP Solution Suffering from Information Overload? (IT Toolbox Blogs)

There’s no doubt that big data is more than just a buzzword. Today, countless case studies, white papers, and testimonials support the notion that big data helps drive business growth. When it comes to your enterprise resource planning (ERP) solution, data are essential. They’re what fuel your ERP solution and help people make timely decisions. However, ...

Six Best Practices for Better Efficiency with APIs (IT Toolbox Blogs)

They may not have the sexiness of artificial intelligence or the Internet of Things, but APIs are having just as much if not more impact on business today. According to research by CA Technologies, roughly 88 percent of enterprises currently use APIs as a strategic asset. About a third of them use APIs to drive ...

The IoT Data Suppliers Want Most from Distributors (IT Toolbox Blogs)

Data in the world of the Internet of Things (IoT) can mean just about anything. Indeed, to different people, IoT data does mean different things. Web shopping sites record clicks and views. Retailers selling the same products get different data elements in their IoT streams. Food suppliers monitor environmental conditions. Manufacturing companies looks at production equipment ...

Kaspersky Aims to Clear Its Name With New Transparency Initiative (SecurityWeek)

Kaspersky Lab announced on Monday the launch of a new Global Transparency Initiative whose goal is to help the company clear its name following recent reports about its inappropriate ties to the Russian government. There have been several media reports analyzing the company’s alleged connection to the Kremlin, which has led to many U.S. officials raising concerns regarding the use of ...

Five People Who Can Benefit from Thinking about Intelligence Differently (SecurityWeek)

Business Risk Intelligence (BRI) Expands the Scope of Intelligence Beyond Technical Indicators Threats that originate on the Internet but can result in damage across the entire enterprise have become an all-too-familiar phenomenon in recent years. Indeed, the days of cybersecurity issues that solely impact cybersecurity teams are far behind us -- a fact that is further solidified by the industry-wide shift away ...

The DDoS Attack Against Dyn One Year Later (Forbes)

I write about hackers, breaches and enterprise security. Opinions expressed by Forbes Contributors are their own.

'We've nothing to hide': Kaspersky Lab offers to open up source code (The Register)

Response to US fretting over alleged ties to Russian snoops Russian cybersecurity software flinger Kaspersky Lab has offered to open up its source code for third-party review. The firm's Global Transparency Initiative is in response to moves to ban the use of its technology on US government systems by the Department of Homeland Security over concerns of alleged ties with ...

Mastercard open sources blockchain API to help make payments more secure and transparent (TechRepublic)

On Friday, Mastercard opened its blockchain technology via its API to developers, allowing select consumers, businesses, and banks to begin making transactions using the ledger technology. For those unfamiliar, blockchain is the technology that allows Bitcoin and other digital currencies to be open, anonymous, and secure. It is a master ledger or database that contains metadata about when and ...

Proactive Defense Against Phishing (InfoRiskToday)

When it comes to warding off phishing attacks, too many organizations are reliant on internal awareness campaigns. But a more proactive defense and controls are needed, says John "Lex" Robinson of PhishMe. One important lesson to learn from business email compromise and other predominant forms of phishing attacks is that they are strikes against business processes, says Robinson, ...

7 tips for critical infrastructure network defenders from the FBI and DHS (TechRepublic)

The Department of Homeland Security and Federal Bureau of Investigation released a joint Technical Alert on October 20, 2017 regarding campaigns by cyber actors targeting government entities and organizations in the energy, nuclear, water, aviation, and critical manufacturing sectors. Although it's common for DHS and FBI to coordinate on products, the detail in this latest alert about ...

Permissioned blockchains (IT Toolbox Blogs)

The original idea of the blockchain, as expressed in the 2009 Bitcoin White Paper, was that it would exists independently of any middlemen such as banks and governments. And yes, that’s just what Bitcoin does today. However, the expected idea that the entire financial industry would just roll over and play dead has failed to materialise. What ...

Ways to Be Successful When Working From Home (IT Toolbox Blogs)

Working from home provides one with a lot of flexibility. In as much as working from offers flexibility, it is just like any job in an office. It requires a person to have focus, discipline, and commitment. An individual has to choose the solutions to use in the business like saas solutions. Additionally, ...

Hacking blockchains (IT Toolbox Blogs)

As I said earlier, it’s quite likely that in a few years from now everything we do on-line will be implemented via some sort of blockchain. And since in a few years from now just about everything we do will be done on-line anyway, this means that our entire lives will be implemented, and therefore controlled, one way ...

How Buying an Electric Vehicle can have an Impact on your Insurance (IT Toolbox Blogs)

There is no doubt that the decision to settle for an electric vehicle (EV) compared to a gas guzzler is more of a lifestyle than economics. However, an electric model can cost you more when it comes to auto insurance, and this is attributed to the high maintenance and running costs. Studies have also shown ...

Massive Number Of IoT Cameras Are Hackable — And So The Next Web Crisis Looms (Forbes)

Hackable CCTV cameras pose a real threat, not just to the devices themselves, but the stability of the web in general. (Photo by Oli Scarff/Getty Images) Anyone who remembers the Mirai botnet, used to cause widespread internet outages in 2016, might have been forgiven ...

Samsung SDS, BioCatch integrate behavioral biometrics to Nexsign (ZDNet)

Samsung SDS will integrate BioCatch's behavioral biometrics to its Nexsign biometric authentication platform, the companies have announced. Nexsign is Samsung's FIDO-certified biometric authentication software for the enterprise that allows users to forgo the use of passwords multiple times and use fingerprint, face, and voice for logins. BioCatch's solution, which will continuously monitor users after login by mapping their behavioral patterns, will add ...

SofiaITC sign up form


Thank you for signing up for SofiaITC's Newsletter and Articles.

SofiaITClogin form