The Seven Young Goats and multifactor authentication

Our ancestors may not have had computers, but they certainly knew a thing or two about keeping children safe. We’ve already used Little Red Riding Hood as a guide to explaining Man-in-the-Middle attacks, handshakes, and phishing. Now let’s talk about two-factor authentication (2FA) and biometric security. This time, we’ll use a somewhat less-known fairy tale called The Wolf and the Seven Young Goats.

Two Years Later, Hackers Are Still Breaching Local Government Payment Portals

Two years after hackers first started targeting local government payment portals, attacks are still going on, with eight cities having had their Click2Gov payment portals compromised in the last month alone, security researchers from Gemini Advisory have revealed in a report shared with ZDNet today. From the news report: These new hacks have allowed hackers to

get their hands on over 20,000 payment card details belonging to US citizens

Rival UN resolutions on Syria cease-fire go down to defeat

UNITED NATIONS (AP) — Rival humanitarian resolutions calling for a cease-fire in Syria’s last rebel stronghold in Idlib were defeated in the Security Council Thursday, reflecting the deep divisions that have prevented the U.N.’s most powerful body from taking action to end the eight-year Syrian conflict.

Founders, get to Disrupt SF for answers to the really hard questions

One lesson from TechCrunch’s Disrupt SF is that founders can’d get enough programming on the really hard questions.  How do I get into Y Combinator? How do I hire a technical lead? How do I raise my first round? That’s why we created a special stage at Disrupt SF for the sole purpose of bringing the top Silicon Valley experts on stage to go deep on those questions with TechCrunch editors and also take audience  questions. We call this the Extra Crunch stage, in a tip of the hat to TechCrunch’s Extra Crunch subscription service, which has the same, founder-centric mission.

Threat landscape for smart buildings

The Kaspersky Industrial Cybersecurity Conference 2019 takes place this week in Sochi, the seventh such conference dedicated to the problems of industrial cybersecurity. Among other things, the conference will address the security of automation systems in buildings — industrial versions of the now common smart home. Typically, such a system consists of various sensors and controllers to manage elevators, ventilation, heating, lighting, electricity, water supply, video surveillance, alarm systems, fire extinguishing systems, etc.; it also includes servers that manage the controllers, as well as computers of engineers and dispatchers. Such automation systems are used not only in office and residential buildings, but in hospitals, shopping malls, prisons, industrial production, public transport, and other places where large work and/or living areas need to be controlled.

BrandPost: The CISO must be included in any SD-WAN discussion

Extending advanced services to the WAN Edge of the network can have a serious impact on a security architecture and strategy. News cycles are filled with stories about critical network breaches that began by taking advantage of some neglected element of the network, whether by exploiting a vulnerable IoT device or by hijacking some wireless access point at a remote retail location.

Cisco Named a Leader in the 2019 Gartner Magic Quadrant for Network Firewalls

The network is at the heart of the digital transformation, and when it comes to securing it, the firewall remains the frontline of defense for organizations. But as the network continues to evolve, we know that security must adapt. For Cisco, this means providing network security that has world-class controls in every place you need them with unified policy and threat visibility. We have made significant strides towards that vision over the past 12 months, and it is always gratifying when the market acknowledges it.