Last year, global citizens experienced dramatic shifts to working from home in response to COVID-19 safety recommendations, with communication, technology and security companies supporting changing business and consumer needs with new products, services and data security tools.
It is amazing that the year of convergence from analog to IP was supposed to be 2008 but it was not until 2012 that IP-cameras started to outsell analog cameras. We sure have come a long way from those analog-oriented days.
- By Jay Jason Bartlett
- Feb 01, 2021
Over the past week, CBP officers in Cincinnati seized 200 counterfeit jerseys determined to have several athletes’ autographs that were unapproved and inauthentic. Had the clothing been real, their cumulative value would have been $42,625.
It’s no surprise that cyber security defenses took their first cues from the physical world. Castles have moats. Your house has a door with a lock. It makes sense to protect your network with a firewall. But cyber criminals soon crashed that plane.
- By Karthik Krishnan
- Dec 03, 2020
More than 100 Republican national security experts on Monday called on GOP congressional leaders to push President Donald Trump to concede the election to President-elect Joe Biden, according to the Washington Post. In a signed letter, the experts urged current GOP officeholders and Trump to prioritize the country's national security interests above politics.
Here is a Q&A that answers questions about spoofing the voter. The answers come from Chris Krebbs, CISA director.
The 2020 election season is a Big Deal as well it should be. The Vote, as foundational parts of the whole, is complicated in practice with history showing us just how complicated it can be. Protecting the process and making sure the Vote is fair, secure, and timely, is vital to American Democracy.
- By Saryu Nayyar
- Oct 28, 2020
Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionally, the ability to protect data and code is limited in conventional computing infrastructure.
Not all internet users are careless about their online security. But many are still victims of cybercriminals and stalkers due to mistakes online.
- By Waqas Baig
- May 18, 2020
With growing number of breaches, there is a huge need for more advanced measures to protect public sector data.
- By Warren Poschman
- May 12, 2020
Endpoints are common targets for ransomware and cryptojacking attackers. Here are the solutions available to address those risks.
- By Ilai Bavati
- May 11, 2020
The Star Wars series provides good examples that we can use as lessons to combat scammers attempting to profit from COVID-19, writes Tyler Reguly.
- By Tyler Reguly
- May 04, 2020
After customers reported fraudulent purchases, Nintendo announced that a credential stuffing campaign led to breaches of thousands of accounts.
- By Haley Samsel
- Apr 27, 2020
Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.
- By Ralph C. Jensen
- Apr 24, 2020
In order to address vulnerabilities and risks, security teams must enable privileged access management and automate security tools, among other tips.
- By Eddie Segal
- Apr 23, 2020
Nearly 8,000 applicants to a Small Business Administration loan program may have had their data shown to other users filling out the application.
- By Haley Samsel
- Apr 22, 2020
Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.
- By Haley Samsel
- Apr 20, 2020
The app will make it easier for individuals and public health officials to track the spread of COVID-19, but privacy rights groups are pushing for transparency.
- By Haley Samsel
- Apr 13, 2020
Business email compromise attacks continue to be effective, tricking victims into transferring funds to fraudulent accounts.
- By Haley Samsel
- Apr 09, 2020
How to improve client and employee trust, collaborate across departments and reduce costs through SOCs
- By Gilad David Maayan
- Apr 07, 2020