Thu T. Pham is a product marketing manager at Duo Security, now part of Cisco. She leads Cisco Zero Trust portfolio messaging and positioning. Thu has ten years experience in the tech and information security fields, as well as a BS in Journalism from Central Michigan University.
A Business Email Compromise (BEC) scam is a type of financial fraud designed to steal money from businesses and individuals. If the email from the CEO says to transfer money ASAP, it's time to call IT, not the bank.
Bundles of personal data records are referred to as fullz on the underground marketplaces by criminals. The data can include names, addresses, phone numbers, social security numbers (SSNs) and date of birth, all of which can be used for medical fraud, impersonation or even extortion. Stolen healthcare information is valued the highest.
As nation-state actors increasingly target physical critical infrastructure, two federal agencies strategize on how to protect against national threats.
Amazon S3 buckets aren't the only data repositories that can leak data because of the organization's configuration errors. Other cloud services on the AWS platform are often found accessible by anyone on the Internet.
The National Institute of Standards and Technology (NIST) released its version 1.1 update to the 1.0 version of their Framework for Improving Critical Infrastructure Cybersecurity, last updated in 2014.