Security -- Network

Press enter to search
Close search
Open Menu

Security -- Network

A collection of news, articles and other featured content about Security -- Network.

Accor Hotels Subsidiary Leaks a Terabyte of Data

The data breach included information from Gekko Group brands and its clients as well as external websites and platforms, such as

The More Cybersecurity Changes, the More It Stays the Same

It is time for an evolution in cybersecurity that focuses on adversary disruption.

henn na hote room with robot

While AI is being embraced by many in hospitality, the recent ‘robot hotel’ vulnerability reminds the industry that there is also great responsibility to manage new risks.

While the investigation is in its early stages, the breach may not have affected all locations.

top 10 list

The WEF’s Centre for Cybersecurity outlined 10 tenets that describe how cyber resilience in the digital age can be formed through effective leadership and design.

Open database leaked 179GB in customer, U.S. government, and military records.

The WatchGuard AP327X is a new IP67-rated Wi-Fi access point (AP) with four N-Type connectors to support a variety of external antennas.

Utilizing proprietary blueprinting and change management process, NuArx was able to work with corporate IT staff to design a common, secure infrastructure.

Secure SD-WAN must support your cloud on-ramp strategy, because the expansion of the network is about much more than adding new devices and platforms.

Repeatedly training staff to recognize cyber-attack tactics is a relatively easy way the hospitality industry can help prevent a future data breach; but 18% of hotel staff are trained only once and 25% don't receive this training ever.

The company announced via a blog on its site that a data breach, impacting roughly 4.9 million users had been detected earlier in the month of September 2019, involving a third party service provider.

Both hotels were compromised via their use of a third-party online booking website company call Roomleader.

The cloud-based service detects and blocks phishing attacks, command and control callbacks and data exfiltration attempts, especially for remote workers.

One of the most prolific attacks is more than 20 years old, is easy to perform with novice skills  obtained on YouTube, and can be done with perfectly legal Wi-Fi hacking tools.

Data included names, addresses, phone numbers, and emails.

At 64%, report reveals a dramatic year-over-year increase in overall malware volume.

Even security professionals are unaware of how much third-party code their company websites are running.

Show More