About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

MilCyberSync Podcast – News: 24 April Episode 8 [April 24, 2022]

MilCyberSync Podcast - News: 24 April Episode 8 [April 24, 2022]Photo from Unsplash

Originally Posted On: https://blog.axellio.com/milcybersync-podcast-april-24

 

This week on the MilCyberSync Podcast hosts Navy Cryptologist, Nick Thomas, and news anchor, Layla Gulen bring you the most up-to-date news on Conti ransomware attacks, Windows 11 upgrade malware attack, Meta reward, Oracle security fixes, and more. Listen to the MilCyberSync Podcast episode 8 here.

Evolving intelligence indicates at least five allied countries including the US are targets of Russian cyberattacks. [01:37]

Members of the Five Eyes Intelligence sharing network, which includes the US, Britain, Canada, Australia, and New Zealand say Moscow could involve existing cybercrime groups in launching attacks on governments institutions and businesses

Malicious Conti ransomware attacks continue. [02:28]

Despite the recent leak of internal communications and code from the Conti ransomware group, the criminal enterprise appears to have continued operations without breaking stride. Researchers believe Conti is part of a massive criminal enterprise tied not just to the majority of Conte and RIOC ransomware attacks, but also to distributing malware such as a trick bot, bizarre loader, and viewer loader.

$5 million is up for grabs for anyone who can help disrupt an illicit flow of funds to North Korea. [03:28]

The US government has continued to warn that North Korea has used a variety of hack attacks, including hitting numerous cryptocurrency exchanges as well as banks such as Bangladesh Bank to help it evade crippling sanctions and fund its WMD programs. The United Nations estimated that cryptocurrency and online bank heists have enabled Pyongyang to invest $2 billion in its development of nuclear weapons and intercontinental ballistic missiles.

Windows users beware of fake Windows 11 upgrade. [09:30]

A recent SEO poisoning technique is designed to trick users to steal their data from browsers and crypto-wallets. SEO poisoning is an illegitimate technique used to achieve a higher search engine ranking for websites. Researchers have sourced the multistage information stealer malware to bad actors that had registered the domain Windows11upgrade11.com.

Facebook parent company Meta announced its Bug Bounty Program will cover vulnerabilities that can be exploited to bypass integrity safeguards. [10:26]

The program expansion is meant to steer researchers’ attention to security issues that attackers may exploit to bypass specific integrity checks meant to limit abuse behaviors. Such texts include mandatory two-factor authentication for specific business manager accounts. Facebook’s own application verification process, or feature restriction enforcements. Researchers who identify endpoints that may perform sensitive actions without triggering a business manager’s two-factor authentication prompt may receive up to $2,000 for their reports.

Oracle announces the release of 520 security fixes. [11:38]

As part of its April 2022 critical patch update, nearly 300 have been identified for vulnerabilities that could be exploited remotely without authentication. Roughly 75 of the patches are of critical severity. Other Oracle Applications that received patches include PeopleSoft Hyperion supply chain, JD Edwards, and hospitality applications.

For even more news on cybersecurity, browse our previous episodes of the MilCyberSync Podcast.

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.