
Addressing security concerns around connected ecosystems
The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security …

Worldwide security appliance revenue increased to $3 billion
According to IDC, the total security appliance market saw positive growth in both vendor revenue and unit shipments for the second quarter of 2017 (2Q17). Worldwide vendor …

Cybercriminals deploying assortment of banking Trojans and ransomware
Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact …

Hackers backdoored CCleaner, likely affecting millions of users
Legitimately signed but backdoored versions of the popular CCleaner utility were available for download from the developer’s Web site and servers for nearly a month, …

Netdata: Distributed real-time performance and health monitoring
Netdata is a system for distributed real-time performance and health monitoring. It provides real-time insight of everything happening on the system it runs (including …

Apple’s Face ID can be quickly disabled in an emergency
A week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The …

Most cloud services still not GDPR-ready
With the compliance deadline for the GDPR fast approaching in May 2018, a new Netskope report took a close look at GDPR readiness among enterprise cloud services, finding …

Week in review: Dangerous Bluetooth, EU cybersecurity certification, how Equifax hackers got in
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Equifax breach happened because of a missed patch The attackers who …

Microsoft Azure confidential computing keeps data in use secret
Microsoft has announced a new Azure (cloud) data security capability: confidential computing. Who’s it for? The capability allows companies to use the cloud even if they …

Chrome will tag FTP sites as “Not secure”
Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as “Not secure”, a member of the Chrome …

New infosec products of the week: September 15, 2017
FinalCode 5.3 extends the types of applications traditional IRM can support FinalCode updated its persistent, file-centric information rights management (IRM) solution. …

Organizations struggle to maximize the value of threat intelligence
Amidst growing concerns of large-scale cyber attacks, 84 percent of organizations participating in a Ponemon Institute survey indicated threat intelligence is “essential …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems