S3 data exposure highlights security risks in the cloud

The cloud provides huge benefits when it comes to agility and scale, but it also can cause major headaches and problems for businesses. The latter was evident last week when Deep Root Analytics, a data management platform provider, suffered from a data leakage. The leak resulted in data exposure of more than 198 million American … continue reading

Digital Experience: All eyes on cybersecurity solutions

New York’s plan to ramp up cybersecurity fit in with the overall tone of last night’s Pepcom Digital Experience event, held at the Metropolitan Pavilion in the city, proving that businesses are innovating on all security fronts. Whether it’s a device to protect hackers from getting into your devices, or it’s software to safeguard your … continue reading

New York City to become major cybersecurity hub as part of new 10-year plan

New York City may turn into the next cybersecurity hub of the United States, thanks to New York Mayor Bill de Blasio’s 10-year plan to invest in new technological industries, raise wages, train New Yorkers, and overall strengthen the middle class. Today, the mayor announced “New York Works,” a series of 25 initiatives to spur … continue reading

Report: The state of endpoint security and the cost of insecure endpoints

Organizations are finding it increasingly difficult to identify dark endpoints, which not only costs enterprises millions of dollars, but also puts companies at risks for threats and attacks. According to new research from Absolute, an endpoint security company, and the Ponemon Institute, organizations are wasting over $6 million in detection, response, and wasted time. While … continue reading

reCAPTCHA

reCAPTCHA Android API, Hortonworks DataFlow 3.0, Blockly 1.0 — SD Times news digest: June 12, 2017

Google is releasing the first reCAPTCHA Android API for Google Play Services. The API will provide a streamlined user experience on mobile and include the latest invisible reCAPTCHA technology. Google first announced Invisible reCAPTCHA in March as a way to run risk analysis behind the scenes, allowing users to pass through the system with zero … continue reading

Photo credit: Katy Levinson via Visualhunt.com / CC BY-SA

New online resource helps detect cybersecurity threats

A group of researchers want to help the cybersecurity community find hidden threats in their solutions. Together, 17 cybersecurity experts have teamed up to launch threathunting.org. The new online hub, sponsored by Sqrrl, provides practical resources, expert research and training material on how to hunt security threats. “There are a lot of people who want … continue reading

cloud

The benefits of cloud computing, Rust 1.18, and intelligent tracking prevention in WebKit — SD Times news digest: June 9, 2017

The cloud is no longer an afterthought, it is a competitive advantage. According to a new Insight-sponsored report by Harvard Business Review Analytic Services, businesses are turning to the cloud for agility, data capabilities, customer and user experiences as well as cost savings. “A company’s IT environment should work for them by enabling them to … continue reading

SecureLogin Authentication Protocol 1.0, GDB 8.0, Boundless Suite 4.10, Audioburst audio API released — SD Times news digest: June 5, 2017

A new decentralized authentication protocol for websites and apps has been released. The SecureLogin Authentication Protocol 1.0 is a password replacement that does not believe in giving third parties access to log into your account from anywhere. The solution aims to solve password reuse, usability, central authority, man-in-the-middle, and malware. “Classic passwords/2FA are poorly designed, … continue reading

Addressing the ‘enemy within’ with best security practices

Though many in IT focus on external threats, I believe that the ‘enemy within’ may be just as damaging. Addressing the human element, both malicious and unintentional, may generate some of the greatest returns on security investment. Counter to conventional wisdom, the majority of breaches are not due to malicious intent.  According to Ponemon, 52% … continue reading

Essential by Andy Rubin

The Essential Phone, IBM cybersecurity initiatives, and Nile.js — SD Times news digest: May 30, 2017

After weeks of tease, creator of Android Andy Rubin has unveiled a new smartphone: The Essential Phone. The phone is being introduced as part of Rubin’s latest company, Essential. According to Rubin, the belief behind Essential is that devices should be personal property, play well with others, shouldn’t become outdated, and should assist the user. … continue reading

Check Point discovers new attack vector through media player subtitles

Malicious hackers will find any way to deliver a cyberattack. This week, Check Point Software researchers discovered a new method for perpetrators, one which is threatening millions of users: Attacking by subtitles. According to Check Point’s research, the new possible attack vector delivers the cyberattack through movie subtitles that are loaded by the user’s media … continue reading

What is the WannaCry ransomware, and why should organizations be concerned?

There’s a new ransomware attack that has affected several organizations globally, and although it’s slow-moving, security experts are urging companies to keep their antivirus programs up-to-date, as well as their software. The ransomware — dubbed WannaCry (WanaCrypt0r 2.0/WCry) — has hit Britain’s National Health Service, some of Spain’s big companies, and has spread across Russia, … continue reading

Next Page »
HTML Snippets Powered By : XYZScripts.com