Week in review: Costliest cybersecurity failures, DNS hijacking protection, AWS security automation
Here’s an overview of some of last week’s most interesting news, interviews and articles: Cisco patches critical, wormable RCE flaw in Cisco Jabber Cisco has …
September 2020 Patch Tuesday forecast: Back to school?
Another month has passed working from home and September Patch Tuesday is upon us. For most of us here in the US, September usually signals back to school for our children and …
Mobile voting: Hype or reality?
The 2020 United States presidential election is already off to a rocky start. We’ve seen technology fail in the primary elections, in-person campaigning halted, and a plethora …
Why data is the missing link in your cybersecurity strategy
Everyone’s aware of how challenging maintaining a strong cybersecurity posture is these days. There’s no longer a perimeter to protect and with remote working becoming the …
Cryptomining activity could be a sign your servers are under attack
Organizations’ on-premise and cloud-based servers are compromised, abused and rented out as part of a sophisticated criminal monetization lifecycle, Trend Micro research …
2020 trends in SOX compliance
SOX & Internal Controls Professionals Group released a survey which measures the costs, execution, challenges and priorities faced by companies that comply with the …
Recommendations to enhance subscriber privacy in 5G
There are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. …
iProov launches system of global threat intelligence for biometric assurance
iProov has launched the world’s first system of global threat intelligence for biometric assurance. The iProov Security Operations Centre (iSOC) combines technology, process …
Netskope Cloud Threat Exchange: Enabling real-time sharing of threat intelligence in the cloud
Netskope announced the Cloud Threat Exchange, one of the industry’s first cloud-based solutions for the ingestion, curation, and real-time sharing of threat intelligence …
Kryon unveils cloud-based Full Cycle Automation-as-a-Service platform powered by Amazon Web Services
Kryon launched the industry’s first cloud-based Full Cycle Automation-as-a-Service (FCAaaS) platform. Powered by Amazon Web Services (AWS), Kryon’s FCAaaS pushes …
Lattice CrossLink-NX FPGA: Helping developers meet demand for embedded and smart vision applications
Lattice Semiconductor Corporation announced the CrossLink-NX-17 FPGA is now available. CrossLink-NX FPGAs deliver the best-in-class low power consumption, small form factor, …
GlobalPlatform simplifies user authentication on smartphones and biometric cards
GlobalPlatform has released a new specification to simplify and bring greater trust to the authentication of digital services on smartphones and biometric-enabled cards. …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices