Remove Business Services Remove Software Remove Technology
article thumbnail

Ransomware infected systems at Xchanging, a DXC subsidiary

Security Affairs

Systems at Xchanging, a subsidiary of Global IT services and solutions provider DXC Technology was hit by ransomware over the weekend. Global IT services and solutions provider DXC Technology disclosed a ransomware attack that infected systems at its Xchanging subsidiary. Securities and Exchange Commission (SEC).

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

A large cache of more than 500 documents published to GitHub last week indicate the records come from i-SOON , a technology company headquartered in Shanghai that is perhaps best known for providing cybersecurity training courses throughout China. A marketing slide deck promoting i-SOON’s Advanced Persistent Threat (APT) capabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: DigiCert acquires Vercara to enhance cloud-based DNS management, DDoS protection

The Last Watchdog

The acquisition of Vercara complements DigiCert’s core PKI and certificate management infrastructure that protects and authenticates people, websites, content, software, and devices. ® The firm’s core target sectors are technology, industrials, and consumer. Crosspoint has offices in Menlo Park, CA and Boston, MA.

DNS 100
article thumbnail

Top IT Asset Management Tools for Security

eSecurity Planet

IT asset management (ITAM) used to be purely about inventorying what hardware and software assets were scattered about the enterprise. IT asset management is software or a cloud-based service that keeps tabs on all hardware components, software, and services operating in an organization. What is ITAM?

Software 110
article thumbnail

Episode 243: The CSTO is a thing- a conversation with Chris Hoff of LastPass

The Security Ledger

Paul talks with Chris Hoff the Chief Secure Technology Officer at LastPass about the CSTO role and the security implications of “software eating the world.”. at the password management firm LastPass, what the CSTO role entails and how companies need to do more to confront the security implications of “software eating the world.”

CISO 52
article thumbnail

New organization helps blind workers find their dream jobs in cybersecurity

SC Magazine

Having the perspective of BVI workers on staff even help software developers avoid certain security and privacy missteps that they might otherwise overlook, according to Darren Burton, a sales consultant with AFB Consulting (a division of the AFB) and former director of AFB Tech. But in 12 th grade, James moved to the U.S.

article thumbnail

With thousands of vendors, companies typically have limited grasp over supply chain security

SC Magazine

Cyberattacks against SolarWinds and other widely implemented software offerings exposed a supply chain rife with exploitable weaknesses. Cyberattacks against SolarWinds and other widely implemented software offerings exposed a supply chain rife with exploitable weaknesses. Stephen Foskett/ CC BY-NC-SA 2.0 ).

Risk 70