Source: Dark Reading
Privacy Teams Helped Navigate the Pivot to Work-from-Home
Annual Cisco privacy study also reports that 90% of organizations say their customers won’t buy from them if they are not clear about data policy practices.
Source: Dark Reading
Mimecast: Recent Certificate Compromise Tied to SolarWinds Attacks
Yet another security firm hit in the sweeping attack campaign believed to be out of Russia.
Source: Threat Post
23M Gamer Records Exposed in VIPGames Leak
The personal data of 66,000 users was left wide open on a misconfigured Elasticsearch server, joining a growing list of companies with leaky clouds.
Source: Dark Reading
BEC Scammers Find New Ways to Navigate Microsoft 365
Their techniques made use of out-of-office replies and automatic responses during the 2020 holiday season, researchers report.
Source: Dark Reading
Cartoon Caption Winner: Before I Go …
And the winner of The Edge’s January cartoon caption contest is …
Source: Dark Reading
Fighting the Rapid Rise of Cyber Warfare in a Changing World
Global cyber warfare is a grim reality, but strong public-private relationships and security frameworks can safeguard people, institutions, and businesses.
Source: Threat Post
Criminal, Domestic Violence Case Info Exposed in Cook County Leak
Cook County, Ill., home to Chicago, has left a database exposed since at least September that contained sensitive criminal and family-court records.
Source: Threat Post
Nefilim Ransomware Gang Hits Jackpot with Ghost Account
An unmonitored account belonging to a deceased employee allowed Nefilim to exfiltrate data and infiltrate systems for a month, without being noticed.
Source: Security Magazine
Leveraging occupancy analytics for better business performance
Loss prevention and safety/risk employees can benefit from occupancy analytics, especially during the current health crisis. But beyond the pandemic, employees in operations, marketing, and merchandising can benefit considerably by learning all about the foot traffic in their stores.
Source: Security Magazine
The push-to-talk ecosystem: Cellular, Wi-Fi, and unified platforms
Adoption of Push-to-Talk over Cellular and Wi-Fi networks is growing in the security market due to the wide area coverage, low cost, the bandwidth to accommodate voice and video communications, and integration with dispatching applications. This article reviews the different types of Push to Talk network deployments, how they work, the devices used, and the benefits to users. The types of Push-to-Talk networks include Push to Talk over Cellular (PoC), Push-to-Talk over Wi-Fi, and unified PoC, Wi-Fi and LMR radio networks.