Fujitsu: Malware on Company Computers Exposed Customer Data

March 18, 2024 at 04:28PM The duration and specifics of the IT services giant’s system infiltration and cyberattack remain uncertain. From the meeting notes, it is unclear how long the IT services giant’s systems were infiltrated and how the cyberattack unfolded. Full Article

6 CISO Takeaways From the NSA’s Zero-Trust Guidance

March 15, 2024 at 12:33PM All companies, not just federal agencies, should strive to implement the “network and environment” aspect of the National Security Agency’s zero-trust guidelines. Based on the meeting notes, the key takeaway is that it is recommended for all companies, not just federal agencies, to strive to implement the “network and environment” … Read more

British Library pushes the cloud button, says legacy IT estate cause of hefty rebuild

March 11, 2024 at 09:42AM The British Library is struggling to recover from the Rhysida ransomware attack due to legacy IT systems, highlighting the need for modernization and increased security measures. The attack caused significant disruption to library services and has emphasized the importance of cloud-based technologies. The institution is now planning a comprehensive IT … Read more

Path Traversal Bug Besets Popular Kyocera Office Printers

January 9, 2024 at 04:27PM A printer bug in unsegmented IT networks has the potential to cause severe issues. Based on the meeting notes, it appears that there is a concern about the potential impact of a printer bug in IT networks that lack proper segmentation. This suggests the possibility of significant consequences stemming from … Read more

Threat Prevention Begins With IT & Security Team Collaboration

November 2, 2023 at 10:04AM The responsibility for cybersecurity in businesses has expanded beyond security teams. As cyber threats continue to evolve, business leaders are restructuring their leadership teams to prioritize cybersecurity. Collaboration between IT and security teams is crucial for preventing cyber threats and maintaining productivity. Communication, collaboration on security strategies, and securing remote … Read more