Security News & Reviews

More Security News

Armis CEO

Armis CTO Details Business Impact of BlueBorne Security Risks VIDEO

|
VIDEO: Nadir Izrael, co-founder and CTO of Armis Security discusses the expanding impact of the BlueBorne bluetooth security vulnerability that his firm discovered.
1088_SecTorRegulations

SecTor Highlights Need for More Trust and Cyber-Security Regulations SLIDESHOW

|
The need for continued evolution of cyber-security technologies and approaches was a key theme at the 11th edition of the SecTor security conference in Toronto.
Oracle.sign

Oracle Issues Emergency Patch for Critical PeopleSoft Vulnerabilities

|
New PeopleSoft JoltandBleed vulnerabilities could enable an attacker to leak information and gain control of an unpatched system.
Aparavi.logo

Startup Aparavi Aims to Solve Long-Term Data Retention Issues

|
Newcomer has built a new SaaS platform from scratch to enable organizations of all sizes to protect data either stored or aggregated on multiple clouds and on premises.
malware

Attacks Exploit Microsoft Dynamic Data Exchange Protocol

|
Attackers are using Microsoft’s Dynamic Data Exchange protocol to download and install malware. Microsoft has warned about the issue, and given users guidance on how to protect themselves, but does not consider it a vulnerability.
Quad9

Quad9 DNS Service Debuts to Help Improve Internet Security

|
The free service backed by IBM, Packet Clearing House and the Global Cyber Alliance aims to make 9.9.9.9 the DNS resolver of choice for internet security.
Preventing Cyber-Attacks

North Korea Getting Ready Wage a Global Cyber War, Experts Say

|
NEWS ANALYSIS: Security researchers say that North Korea’s activities have changed recently in a way that may indicate that the rogue regime may be gathering the information it needs launch a global cyber-attack.
Election Polling Errors

States Starting to Implement Audits to Bolster Election Integrity

|
In the face of overwhelming evidence that the Russians meddled in the 2016 U.S. presidential election, states are adopting auditing measure to detect any possible direct ballot fraud and give voters confidence in the results.
Bruce Schneier SecTor

IBM's Schneier: It's Time to Regulate IoT to Improve Cyber-Security

|
In a keynote address at the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software and the internet of things.
1088_StepUpGDPR

Companies Must Step Up Mobile GDPR Compliance Efforts, Lookout Finds SLIDESHOW

|
A Lookout security report warns organizations to not forget about mobile when considering EU GDPR compliance requirements.
North Korea Hacker Groups

Researcher Provides Insight Into North Korea Cyber-Army Tactics

|
In a session at the SecTor security conference, a security researcher reveals details on the tools and methods used by multiple attack groups operating out of North Korea.
David Shrier SecTor

MIT Helping to Define New Model to Restore Trust in Cyber-Security

|
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data privacy for cyber-security.
Gabriel Ryan Sector

EAP-TLS Detailed as WiFi Security Best Practice at SecTor

|
A security researcher explains how WPA2 Enterprise wireless security can be bypassed and why the EAP-TLS wireless authentication protocol should be more widely deployed to help mitigate risks.

Enterprise Tech Videos