Archive

Back to homepage
Hardware/Network

IT Security Pros: Encryption Backdoors Are Election Hacking Risk

The IT security community overwhelmingly believes that government-mandated encryption backdoors will put countries at a greater risk of election hacking, according to new Venafi research. The security vendor polled over 380 security professionals

Cloud

Over a Third of Firms Have Suffered a Cloud Attack

Over a third of organizations have already suffered an attack on their cloud systems, yet many are failing to eradicate potential security blind spots, according to a new poll from Outpost24.

Hardware/Network

Identifying vulnerable IoT devices by the companion app they use

For better or worse, connected “smart” devices are springing up like mushrooms. There is no doubt that they can be very helpful but, unfortunately, most have a slew of security

Software

Unlocking the future of blockchain innovation with privacy-preserving technologies

The origins of blockchain as many are familiar with it today can be traced back to the Bitcoin whitepaper, first published in 2008 by Satoshi Nakamoto, which offered a vision of

Hardware/Network

Should you block newly registered domains? Researchers say yes

7 out of 10 newly registered domains (NDRs) are either malicious, suspicious or not safe for work, say Palo Alto Networks researchers, and advise organizations to block access to them

Artificial Intelligence

The Impact of Artificial Intelligence on Cyber Security

There is currently a big debate raging about whether Artificial Intelligence (AI) is a good or bad thing in terms of its impact on human life. With more and more

Industry Insights

We must treat cybersecurity as a public good. Here’s why

Soon your fridge will be able to buy your food on Amazon, having noticed what you liked on Facebook and Instagram. Cybersecurity is crucial for this to happen; to make

Hardware/Network

Identifying vulnerable IoT devices by the companion app they use

For better or worse, connected “smart” devices are springing up like mushrooms. There is no doubt that they can be very helpful but, unfortunately, most have a slew of security

Hardware/Network

Identifying evasive threats hiding inside the network

There is no greater security risk to an organization than a threat actor that knows how to operate under the radar. Malicious insiders and external cybercriminals are getting savvier. They are

Hardware/Network

Rationalizing the Security Stack for More Effective Protection

Most IT security professionals believe the answer to strengthening their organization’s security posture is to buy more solutions. The idea that more tools equals better protection is a widely-held misconception,