People spend a little less time looking at fake news headlines than factual ones
The term fake news has been a part of our vocabulary since the 2016 US presidential election. As the amount of fake news in circulation grows larger and larger, particularly …
Toshiba S300 Surveillance Hard Disk Drive series now optimized for demanding surveillance applications
Toshiba announces the expansion of the Toshiba S300 Surveillance Hard Disk Drive series. This includes a new S300 series using shingled magnetic recording (SMR) technology for …
Paul Appleby joins Elastic as president, worldwide field operations
Elastic announced the appointment of Paul Appleby as president, worldwide field operations. Appleby was most recently the chief executive officer of Kinetica, and will be …
How do I select a password management solution for my business?
91 percent of people know that using the same password on multiple accounts is a security risk, yet 66 percent continue to use the same password anyway. IT security …
Facing gender bias in facial recognition technology
In the 1960s, Woodrow W. Bledsoe created a secret program that manually identified points on a person’s face and compared the distances between these coordinates with other …
Confirmed: Browsing histories can be used to track users
Browsing histories can be used to compile unique browsing profiles, which can be used to track users, Mozilla researchers have confirmed. There are also many third parties …
91% of cybersecurity pros want stricter internet measures to tackle misinformation
There’s a growing unease amongst the cybersecurity community around the recent rise in misinformation and fake domains, Neustar reveals. 48% of cybersecurity …
Researchers develop AI technique to protect medical devices from anomalous instructions
Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as …
A look at enterprise network and application modernization efforts
80% of organizations are struggling to reach application delivery requirements with their existing infrastructure. But, amid pandemic concerns, efforts to modernize networks …
Dataguise unveils method for enterprises to report impact of data breach faster and more accurately
Dataguise announced a patent-pending method of projecting unique data counts that enables organizations to report the impact of a data breach faster and more accurately than …
CBTS launches Secure Remote Collaboration solution portfolio optimized for WFH environments
CBTS announces the launch of its Secure Remote Collaboration portfolio of solutions, including video conferencing and security functionality that is optimized for …
CTM360 Threat Manager: Allowing users to tackle threats on the go
CTM360 has announced the launch of its latest mobile app, ‘The Threat Manager.’ The app aims to allow it’s users to tackle threats on the go, with the aim to simplify security …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation