The state of GDPR compliance in the mobile app space
Among the rights bestowed upon EU citizens by the General Data Protection Regulation (GDPR) is the right to access their personal data stored by companies (i.e., data …
A 2020 approach to security: People matter
The information security industry frequently utilizes the phrase “people, processes and technology” (PPT) to describe a holistic model of securing the business. But though …
Researchers aim to improve code patching in embedded systems
Three Purdue University researchers and their teammates at the University of California, Santa Barbara and Swiss Federal Institute of Technology Lausanne have received a DARPA …
Online fraud against businesses drops, increases against consumers during reopening
Fraudsters are decreasing their schemes against businesses, but increasing COVID-19 focused scams against consumers online, according to TransUnion. Fraudsters less targeting …
Most organizations have no Active Directory cyber disaster recovery plan
Although 97% of organizations said that Active Directory (AD) is mission-critical, more than half never actually tested their AD cyber disaster recovery process or do not have …
New AI algorithm to detect cryptocurrency miners as they steal power
Computer scientists have developed a new artificial intelligence (AI) system that may be able to identify malicious codes that hijack supercomputers to mine for cryptocurrency …
AWS io2: Provisioned IOPS SSD volumes for Amazon Elastic Block Store
Amazon Web Services (AWS), an Amazon Company, announced general availability of io2, the next generation Provisioned IOPS SSD volumes for Amazon Elastic Block Store (Amazon …
PCTEL launches low-profile vertical antenna for 5G FR1 wireless networks
PCTEL introduced its new low-profile vertical antenna for 5G FR1 wireless networks, covering 600 MHz to 6 GHz frequencies. The BMLPV5000 supports the high-speed requirements …
Aviatrix cloud network platform serves as a Network Factory for new and existing AWS accounts
Aviatrix announced new capabilities to automate enterprise network infrastructure deployment and operations for organizations using the account factory feature of AWS Control …
CI Security expands offerings to include EDR with Microsoft Defender ATP
CI Security announced an expansion of existing offerings to include Endpoint Detection and Response (EDR) with Microsoft Defender Advanced Threat Protection (ATP). CI …
Winston & Strawn address the full spectrum of clients’ privacy and data security challenges
The global law firm of Winston & Strawn announced the formation of a new, fully integrated Global Privacy & Data Security practice. Sheryl Falk, Steve Grimes, and …
Sourcepoint and Oracle help protect consumer privacy and manage compliance and user consent
Sourcepoint announced its collaboration with Oracle Cloud Customer Experience (CX), Oracle’s suite of customer experience products. Sourcepoint has formed a relationship to …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation