Julie Butler
Julie Butler is a Network Security Engineer with vast knowledge of organizational network and security system design and administration. Her career in the IT profession spans 15 years. She’s experienced in testing and configuring hardware and software systems, identifying network vulnerabilities, incidence response, and building safeguards to prevent future threats.
-
China Hacked US Telecom Data, FBI and CISA Investigations Confirm
Chinese hackers breached various telecommunication service providers, the US federal investigation has confirmed. According to TechCrunch, the motive of the China hack on US telecom data attack was to access wiretap syst... -
CISA Adds ScienceLogic SL1 to Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a key ScienceLogic SL1 feature to its Known Exploited Vulnerabilities (KEV) catalog. This move comes after reports of a zero-day attack discovere... -
Cybersecurity Lobby Group in China Calls for Review Intel Products
Chinese cybersecurity group, Cybersecurity Association of China (CSAC) has said products manufactured by US chip maker, Intel pose a security threat to China and should be subjected to security review. The call for China... -
Comcast Customer Data Stolen in a Ransomware Attack
US telco, Comcast Cable Communications has raised alarm over a cyber attack that led to theft of personal data belonging to more than 230,000 customers. According to TechCrunch, Comcast customer data was stolen following... -
5 Cybersecurity Practices in Accounting to Safeguard Your Financial Data
Introduction CPA firms should consider investing in robust cybersecurity in accounting structures, especially with the increasing target from cybercriminals. Financial companies hold valuable data such as customers’... -
Top Cybersecurity Threats for Accounting Firms and How to Prevent Them
Introduction Advancements in cloud computing and migrating sensitive financial data to cloud-based software have seen a rise in cybersecurity threats for accounting firms. Financial institutions must understand that the ... -
Salesforce Acquires Data Management Startup, Own
Cloud-based software company Salesforce has acquired data management and protection solutions firm, Own. TechCrunch reported that Salesforce paid $1.9 billion in cash to acquire Own. The Salesforce-Own acquisition is the... -
How German Firms Lost Billions to Cybercrime Last Year
A new survey has shown that cybercrime sabotage cost German firms up to $298 billion this past year. Yahoo Finance reported that this amount represents a 29% increase from the previous year. The survey was conducted by B... -
Microsoft Unveils Tool to Fast-Track Global Outage Recovery
CrowdStrike now says that ‘a significant number’ of computers affected by the IT outage experienced last week are back online. As businesses continue to work through the CrowdStrike-Microsoft outage recovery, CNN rep... -
CrowdStrike’s Faulty Update Exposes Interconnectivity Risks
A software update by global cybersecurity company, CrowdStrike triggered a massive technology outage across the world on Friday. The Microsoft outage mostly affected computers running on the Windows operating system. Fol... -
Google Eyes Cybersecurity Business with $23B Wiz Acquisition
Alphabet, Google’s parent company, is in the process of acquiring New York-based cybersecurity startup, Wiz. According to the Wall Street Journal, the Google-Wiz acquisition deal will be valued at around $23 billion. N... -
Evolve Bank’s Cyber Attack Exposes Risk Management Cracks in FinTech
Last week, Evolve Bank & Trust announced that it had suffered a data breach. The Evolve bank data breach was characterized by unauthorized leakage of customer data on the dark web. According to CIO News, the data bre... -
Did Unsecured Accounts Lead to Snowflake Customer Password Breach?
Snowflake, a US cloud data company, has found itself in the middle of a data theft storm. Computer Weekly suggests a potential connection between data breaches on Ticketmaster and Santander and the Snowflake customerR... -
Implementing DevSecOps for Cloud Security
Introduction DevSecOps refers to development, security, and operations. It is a methodology that integrates security practices into the DevOps process, emphasizing the importance of security from the very beginning of so... -
10 Common Cyber Resilience Challenges and How to Overcome Them?
Introduction A breakdown of global cybercrime damage costs predicted that in 2024 it will be USD 9.5 trillion a year. This number is daunting and sums up to billions of dollars per month in cybercrime damage. With techn... -
Safe Tracking with Apple and Google Join Efforts To Develop an Industry Specification That Combats Privacy Concerns
Online privacy has become a critical issue for consumers in recent years with data collection and tracking as growing concerns. Tech giants Apple and Google respond by taking the lead in developing an industry specificat... -
5 Types of Software that Safeguard your Data Security
Introduction As you know, there are many types of programs designed to protect your information. The most common type of software is a firewall and virus scanners. They are designed to keep hackers at bay and keep your f... -
What Is 6G Technology? (Everything You Need To Know)
Introduction 5G is still in the early days of deployment and most of us are still trying to wrap our heads around it. But you know what? Now, with rapid development in the tech industry, we are starting to hear abo... -
Top 14 Trends in Cybersecurity To Look Out
Introduction We saw a new wave of digitalization taking root due to the global pandemic. This accelerated digitalization and businesses have to shift their work online. As we step into 2021, businesses are looking for ne... -
Top 10 Best Chrome Security Extensions For Browser
Introduction Google Chrome has become one of the most used internet browsers. It has a simple, clean, and responsive layout to provide a secure and safe browsing experience. Despite the company’s great work in building... -
7 Steps to Write the Ultimate App Security Strategy
Introduction You’re developing an app that you believe will be a major success. You have a great idea and you know your target audience is going to love it. Plus, you have a team of brilliant developers working on incl...