2022 - Page 3 of 36 - Exotic Digital Access
  • Kangundo Road, Nairobi, Kenya
  • support@exoticdigitalaccess.co.ke
  • Opening Time : 07 AM - 10 PM
Cisco SD-WAN Fabric is SecOps New Best Friend

Cisco SD-WAN Fabric is SecOps New Best Friend

In my last blog post, Cisco Innovations Create a More Secure and Scalable SD-WAN Fabric, we covered the newest innovations that integrate identity awareness with Cisco Identity Services Engine (ISE) into the SD-WAN fabric; extend the network security fabric to remote home offices and workspaces; and detects advanced persistent threats through integrations with Cisco Secure […]

Read More
Identity Security Needs Humans and AI Working Hand in Hand

Epic Management Provides Notice of Data Security Incident

BOILING SPRINGS, S.C., Dec. 14, 2022 /PRNewswire/ — Epic Management LLC (“Epic”), a healthcare management company, has learned of a data security incident that may have impacted data belonging to certain patients. On September 2, 2021, Epic discovered unusual activity in its digital environment. Upon discovering this activity, Epic immediately took steps to secure the environment. Epic also engaged […]

Read More
PHP 8.2 introduces read-only classes

PHP 8.2 introduces read-only classes

A major update to the stalwart scripting language for web development, PHP 8.2 has arrived with performance, syntax, and type safety improvements along with new capabilities such as read-only classes and stand-alone types. PHP 8.2 was published December 8 and can be accessed from php.net. Support for read-only classes in PHP 8.2 means that a […]

Read More
Researchers Demonstrate How EDR and Antivirus Can Be Weaponized Against Users

Researchers Demonstrate How EDR and Antivirus Can Be Weaponized Against Users

Dec 12, 2022Ravie LakshmananEndpoint Detection / Data Security High-severity security vulnerabilities have been disclosed in different endpoint detection and response (EDR) and antivirus (AV) products that could be exploited to turn them into data wipers. “This wiper runs with the permissions of an unprivileged user yet has the ability to wipe almost any file on […]

Read More
Cloud-Native: The Modern Way to Develop Software

Cloud-Native: The Modern Way to Develop Software

For over a decade, businesses in all industries have undergone a digital metamorphosis. This evolution is marked by transitioning from on-premises software solutions to cloud-based computing technology. By leveraging cloud-computing resources, businesses can gain access to scalable assets, increase organizational performance, and optimize digital agility. However, traditional cloud solutions primarily focus on software-as-a-service (SaaS) applications. […]

Read More
I love my Spotify Wrapped, but there's more to me than a list

I love my Spotify Wrapped, but there’s more to me than a list

Sabrina Ortiz/ZDNET As you tapped through your Instagram stories last week, you were probably bombarded with screenshots of other people’s Spotify Wrapped or Apple Music Replay stats, perhaps even my own – because I am (unapologetically) part of the problem.  Sharing our music interests with others isn’t something new. People have been sharing music tastes […]

Read More
Week in review: Rackspace outage, Kali Linux 2022.4 released, Patch Tuesday forecast

Week in review: Rackspace outage, Kali Linux 2022.4 released, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Rackspace Hosted Exchange outage was caused by ransomwareRackspace has finally confirmed the cause of the security incident that resulted in an ongoing outage of its Hosted Exchange service: it’s ransomware. Google Chrome zero-day exploited in the wild (CVE-2022-4262)Google has patched […]

Read More
California County Says Personal Information Compromised in Data Breach

Video: Deep Dive on PIPEDREAM/Incontroller ICS Attack Framework

In this session from SecurityWeek’s 2022 ICS Cybersecurity Conference, Mark Plemmons, Sr. Director for Threat Intelligence at Dragos, dives deep into the technical details and real-world impact on the modular ICS attack framework known as PIPEDREAM/Incontroller that can be used to disrupt and/or destruct devices in industrial environments. In April 2022, a joint advisory from […]

Read More