Cyber Security and Paper!

cyberawake

I have just published an article over on our online training site, CyberAwake, about how you start a cyber security review and then how paper becomes a significant step in that process: Where are the boundaries for your cyber security? – CyberAwake

Log4shell – the vulnerability that is inside many software packages – just ask VMware – is here to stay

The SolarWinds attack, where the threat actors got inside SolarWinds’ systems and added their malicious code to a legitimate software update, so having SolarWinds distribute this malware to many of its high and low profile customers around the world, seems a long time ago now. But at least in this …

You need to be aware of the support status of your Cisco equipment

Here is something new to add to your cyber security plan – the end-of-life of any Cisco equipment you have, as Cisco is no longer going to issue security patches for expired products: Cisco won’t fix authentication bypass zero-day in EoL routers (bleepingcomputer.com) You or your cyber security team need …