Army researchers awarded patent for secure comms
Army researchers have been awarded a patent for inventing a practical method for Army wireless devices to covertly authenticate and communicate. Photo by Jason Edwards …
AWS launches Amazon Braket to help customers explore and design quantum algorithms
Amazon Web Services (AWS), an Amazon.com company, announced the general availability of Amazon Braket, a fully managed AWS service that provides a development environment to …
Sectigo unveils Sectigo Quantum Labs to help orgs prepare for quantum computers
Sectigo announced the launch of Sectigo Quantum Labs to help organizations prepare for the time when quantum computers render existing standard encryption algorithms obsolete. …
Infineon and Fingerprint Cards partner to enable mass deployment of biometric payment cards
Biometric payment cards with an integrated fingerprint sensor make contactless payments more convenient, more secure and hygienic. The contactless card remains in the hands of …
2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity
(ISC)² announced the list of honourees for its 2020 (ISC)² Global Achievement Awards, which recognize and celebrate the most outstanding annual and lifetime achievements in …
TAG hires Danielle Meah as Director of Threat Intelligence
The Trustworthy Accountability Group (TAG) announced the hiring of Danielle Meah, former Global Head of Threat Intelligence for Citigroup, as TAG’s first Director of …
Week in review: vBulletin 0-day, open source projects under attack, critical security updates galore
Here’s an overview of some of last week’s most interesting news and articles: Intel, SAP, and Citrix release critical security updates August 2020 Patch Tuesday …
State-backed hacking, cyber deterrence, and the need for international norms
As time passes, state-backed hacking is becoming an increasingly bigger problem, with the attackers stealing money, information, credit card data, intellectual property, state …
New infosec products of the week: August 14, 2020
Ericom Application Isolator separates corporate apps from unauthorized users to prevent ransomware Ericom Software announced the introduction of Ericom Application Isolator, a …
In reality, how important is zero trust?
Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to …
CIOs prioritizing IAM over endpoint security and security awareness training
CIOs are prioritizing identity and access management (IAM) over endpoint security and security awareness training in 2020, according to a Hitachi ID survey. The survey, …
What is the impact of the pandemic on managed services providers?
A new SolarWinds study revealed the operational impact of the current pandemic on managed services providers (MSPs) and future growth opportunities in the market. The study …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation