Category: Featured

Tech Time Warp
Tech Time Warp: No one is sending you pics of Anna Kournikova

Tech Time Warp: No one is sending you pics of Anna Kournikova

As your mother told you, if it’s too good to be true, it probably is. And that’s as true today as it was 23 years ago when “OnTheFly,” a 20-year-old Dutch programmer/hacker, used a computer virus to proclaim his adoration...

/ February 16, 2024
email
How to help your clients comply with new Google and Yahoo email requirements

How to help your clients comply with new Google and Yahoo email requirements

When it comes to email security, most of the focus is on what happens when a malicious email is received. Optimally, a multi-layered approach will help filter out phishing emails and other attacks via technology and user training. But some...

/ February 15, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New Ivanti vulnerability

Cybersecurity Threat Advisory: New Ivanti vulnerability

Ivanti has warned customers of a new security flaw that could allow attackers to bypass authentication. The vulnerability, CVE-2024-22024, has received a CVSS score of 8.3. Read this Cybersecurity Threat Advisory to learn the significant risk this threat poses to...

/ February 14, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerability in FortiOS

Cybersecurity Threat Advisory: Critical vulnerability in FortiOS

Fortinet has disclosed a critical vulnerability affecting FortiOS, the operating system that runs on Fortigate SSL VPNs. The vulnerability known as CVE-2024-21762, received a CVSS score of 9.6. Please review the following recommendations in this Cybersecurity Threat Advisory to mitigate...

/ February 13, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Patches for critical vulnerabilities

Cybersecurity Threat Advisory: Patches for critical vulnerabilities

Security patches were recently released from various vendors including Cisco, Fortinet, and VMware. Read this Cybersecurity Threat Advisory as it shares the impact of each of the vulnerabilities and how to mitigate the risks they pose. What is the threat?...

/ February 9, 2024
Pioneers in Tech
Pioneers in Tech: Gladys West, the “hidden figure” of GPS

Pioneers in Tech: Gladys West, the “hidden figure” of GPS

We all rely on GPS nearly every day and may frequently marvel at how much easier it makes life. (Think about it: When was the last time you were lost?) But how often do we think about the people behind...

/ February 9, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: AnyDesk production system breach

Cybersecurity Threat Advisory: AnyDesk production system breach

AnyDesk confirmed that a cyberattack on their production systems has taken place. This has caused AnyDesk users to become vulnerable to data breaches, phishing attacks, and malware. Barracuda MSP recommends updating to the latest version of Windows (8.0.8) immediately and...

/ February 5, 2024
ai
A CISO’s guide to the role of AI in cybersecurity

A CISO’s guide to the role of AI in cybersecurity

Today’s digital landscape is evolving at an unprecedented pace, and the rapid emergence of generative artificial intelligence (GenAI) marks a distinct shift in how we perceive and use the capabilities of AI, especially in the realm of cybersecurity. According to...

/ February 2, 2024
Tech Time Warp: Kasparov vs. Deep Blue kicks off AI debate

Tech Time Warp: Kasparov vs. Deep Blue kicks off AI debate

It’s a bit jarring to think how rapidly artificial intelligence became a tool of everyday life following the introduction of ChatGPT in November 2022. Now, instead of Googling pasta recipes or travel tips, we’re asking AI, and we’re receiving answers...

/ February 2, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Ivanti alerts of new high-severity flaws

Cybersecurity Threat Advisory: Ivanti alerts of new high-severity flaws

During Ivanti’s announcement of their fixes for the recent critical zero-day vulnerabilities, the software vendor alerts of two new high-severity flaws in its Connect Secure and Policy Secure products. One of which is said to be under targeted exploitation in...

/ February 1, 2024