Cybersecurity


DARPA’s First Bug Bounty Targets Hardware-based Security

DARPA’s First Bug Bounty Targets Hardware-based Security

The Defense Advanced Research Projects Agency is inviting security researchers to find vulnerabilities in its System Security Integration Through Hardware and Firmware systems.

Remote Working and VPN

Remote Working and VPN

In this pandemic of coronavirus, all organizations have shifted from office work to remote work. By saying that, you must have heard about VPNs, and how they improve security and privacy.

Remote ID Becomes Even More Critical Now

Remote ID Becomes Even More Critical Now

With the global digital transformation, many of the interactions that enterprises have with their customers are shifting online.

privacy lock

Ten Crucial Privacy Statistics That May Surprise You

Not all internet users are careless about their online security. But many are still victims of cybercriminals and stalkers due to mistakes online.

coronavirus illustration

Joint Survey From Security Organizations Reveals Pandemic's Impact

Industry associations keeping members informed about how the coronavirus crisis is affecting security businesses.

data tokenization

Why Data Tokenization Could Be the Answer to Government Security Prayers

With growing number of breaches, there is a huge need for more advanced measures to protect public sector data.

endpoint security

Endpoint Security: The New Frontier

Endpoints are common targets for ransomware and cryptojacking attackers. Here are the solutions available to address those risks.

the mandalorian

May the Fourth: Security Lessons from The Mandalorian

The Star Wars series provides good examples that we can use as lessons to combat scammers attempting to profit from COVID-19, writes Tyler Reguly.



nintendo game

Hackers Target Nintendo, Affecting Accounts of 160,000 Users

After customers reported fraudulent purchases, Nintendo announced that a credential stuffing campaign led to breaches of thousands of accounts.

who flag

World Health Organization Sees Dramatic Uptick in Cyber Attacks

Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.

devops globe

Top Eight Methods to Secure DevOps Pipelines

In order to address vulnerabilities and risks, security teams must enable privileged access management and automate security tools, among other tips.

Glitch May Have Exposed Data of Thousands of Small Businesses Applying for Federal Relief Loans

Nearly 8,000 applicants to a Small Business Administration loan program may have had their data shown to other users filling out the application.

Capitol Hill at sunset

Industry Groups Push For More Cybersecurity Funding In Future COVID-19 Stimulus Legislation

With high numbers of ransomware attacks and increased threats due to teleworking, advocacy groups want Congress to prioritize cybersecurity funds to local and state governments.

new york capitol

New York State Responded to Cyber Attack on Government Servers Weeks Before Coronavirus Pandemic Hit

Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.

security guard

Demand for Security Guards, Cybersecurity Workers Remains High Amid Coronavirus Pandemic

Security companies are scrambling to hire guards and IT workers as businesses worry about break-ins to closed properties and cybersecurity issues associated with working remotely.

5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

google coronavirus

Apple and Google Team Up For Coronavirus Tracing App, Sparking Privacy Concerns

The app will make it easier for individuals and public health officials to track the spread of COVID-19, but privacy rights groups are pushing for transparency.

security shield

How to Enhance Public Safety With Emerging Technologies

Security leaders are investing in advanced technologies like artificial intelligence, biometric solutions and advanced communication networks.

fbi front

FBI Warns Financial Institutions To Beware of Coronavirus-Related Scams

Business email compromise attacks continue to be effective, tricking victims into transferring funds to fraudulent accounts.

Avoiding Danger with Secure Data Storage

Avoiding Danger with Secure Data Storage

While CCPA is meant to enhance privacy rights and consumer protection for the residents of California, as with many laws enacted in the state, it will impact most businesses across the country and the rest of the world.

Digital Edition

  • Security Today Magazine - October 2020

    October 2020

    Featuring:

    • No Touch, Low Touch
    • Going the Distance
    • Accelerating Security
    • Bringing Rapid Identification
    • Shifting Strategies

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety