September 21, 2021

Security researchers disclosed a new zero-day flaw in Apple’s macOS Finder that can allow attackers to run arbitrary commands on Macs. Independent security researcher Park Minchan disclosed a zero-day vulnerability in Apple’s macOS Finder that can be exploited by attackers to run arbitrary commands on Mac systems running any macOS version. The flaw is due […]

The post A zero-day flaw allows to run arbitrary commands on macOS systems appeared first on Security Affairs.

Read More A zero-day flaw allows to run arbitrary commands on macOS systems

Pearson Canada and Canadian edtech Knowledgehook have partnered to provide digital support for teachers and students to improve mathematics education in Canada.

The post Pearson and Canadian edtech partner to level up digital math support across Canadian schools  first appeared on IT World Canada.

Read More Pearson and Canadian edtech partner to level up digital math support across Canadian schools 

Russia-linked cyber espionage group Turla made the headlines again, the APT has employed a new backdoor in a recent wave of attacks Cisco Talos researchers reported that the Russia-linked Turla APT group recently used a new backdoor, dubbed TinyTurla, in a series of attacks against the US, Germany, and Afghanistan. The threat actors are using […]

The post Turla APT group used a new backdoor in attacks against Afghanistan, Germany and the US appeared first on Security Affairs.

Read More Turla APT group used a new backdoor in attacks against Afghanistan, Germany and the US

After an increasing number of Canadians and businesses moved online throughout the COVID-19 pandemic, three-quarters of the population feels it’s important to have a secure and privacy-enhancing digital ID to safely make transactions online.  Moreover, a survey from Digital ID and Authentication Council of Canada (DIACC) has revealed that the majority of Canadians believe it […]

The post Ontarians are getting digital ID this fall: All you need to know first appeared on IT World Canada.

Read More Ontarians are getting digital ID this fall: All you need to know

In the face of increasingly advanced threats, complex multi-cloud environments, and an evolving trust fabric, identity is emerging as a critical player to deliver the next generation of security, governance, and privacy services.

The post 3 trends shaping identity as the center of modern security appeared first on Microsoft Security Blog.

Read More 3 trends shaping identity as the center of modern security

In the face of increasingly advanced threats, complex multi-cloud environments, and an evolving trust fabric, identity is emerging as a critical player to deliver the next generation of security, governance, and privacy services.

The post 3 trends shaping identity as the center of modern security appeared first on Microsoft Security Blog.

Read More 3 trends shaping identity as the center of modern security

With over 100 available phishing templates that mimic known brands and services, the BulletProofLink operation is responsible for many of the phishing campaigns that impact enterprises today. We are sharing these findings so the broader community can build on them and use them to enhance email filtering rules as well as threat detection technologies like sandboxes to better catch these threats.

The post Catching the big fish: Analyzing a large-scale phishing-as-a-service operation appeared first on Microsoft Security Blog.

Read More Catching the big fish: Analyzing a large-scale phishing-as-a-service operation

In 2017, The Economist published a story titled, The world’s most valuable resource is no longer oil, but data. Four years later, “data is the new oil” is a common business catchphrase. But today many companies are struggling to effectively use the data they’ve collected. At a recent roundtable, Jim Collins, an IBM AI strategy executive […]

The post AI-infused planning and forecasting is reshaping the way finance teams work first appeared on IT World Canada.

Read More AI-infused planning and forecasting is reshaping the way finance teams work

Coffee Briefings are timely deliveries of the latest ITWC headlines, interviews, and podcasts. Today’s Coffee Briefing is delivered by IT World Canada reporter Pragya Sehgal, with files from the rest of the editorial team! Missed last week’s Coffee Briefing? We’ve got you covered. What’s new this week All you need to know about the new […]

The post Coffee Briefing, Sept. 21, 2021 – all the tech news; a podcast roundup; and more first appeared on IT World Canada.

Read More Coffee Briefing, Sept. 21, 2021 – all the tech news; a podcast roundup; and more

NIST’s National Cybersecurity Center of Excellence (NCCoE) has released a draft of NIST Special Publication (SP) 1800-32, Securing the Industrial Internet of Things: Cybersecurity for Distributed Energy Resources. The use of small-scale distributed

Read More Securing the IIoT—Cybersecurity for Distributed Energy Resources: Draft SP 1800-32 Available for Comment

For years, cyber security experts have predicted a shift towards hybrid working – but they weren’t expecting it to come so suddenly and as a result of a global crisis. Nonetheless, they have been proven right, with millions of organisations deciding to keep their remote set-up even as the pandemic subsides. To make hybrid work a success, though, organisations must regularly evaluate their IT processes. According to a UKG study, 87% of UK employers accelerated their digital transformation project during the pandemic, and 76% said they had used one new technology or app during the crisis. Commenting on the report,

The post The IT challenges of hybrid working appeared first on IT Governance UK Blog.

Read More The IT challenges of hybrid working