Introducing “NEXT” by Cisco Secure

Introducing “NEXT” by Cisco Secure

Inspiring discussions around innovative tech   Technology has typically had a reputation for being exciting and inventive. Unfortunately, this hasn’t always been the case for security. But times have changed. We are now recognizing the crucial role security plays in any groundbreaking technology. Without strong defenses, even the most visionary app is likely to crash and burn. So it’s imperative that big security players like Cisco stay on top of what’s next. I am thrilled…

Read More

Education Sector Experienced 44% Increase in Cyber-Attacks Over Last Year

Education Sector Experienced 44% Increase in Cyber-Attacks Over Last Year

The education sector experienced a 44% increase in cyber-attacks when compared to 2021, with an average of 2297 attacks against organizations every week, according to Check Point’s 2022 Mid-Year Report. The research paper suggests that part of the appeal is the sheer number of personal details that threat actors can obtain by targeting organizations in this sector. “Academic institutions are currently sitting ducks,” said Deryck Mitchelson, field CISO at Check Point, commenting on the new data….

Read More

Oracle continues to lay off staff in the US

Oracle continues to lay off staff in the US

Oracle is continuing to lay off people in the US, just months after the company acquired healthcare data specialist firm Cerner for $28.3 billion and announced a first round of layoffs, according to published reports. The layoffs come as hiring for IT jobs slows due to worries about an economic downturn. In Oracle’s latest round of layoffs, the company cut 201 employees, including data scientists and developers, from its Redwood Shores office, according to reports…

Read More

Google Next ’22: A new era of built-in cloud services

Google Next ’22: A new era of built-in cloud services

Image: Google Cloud Next ’22 press release. Companies migrating to the cloud no longer choose their vendor strictly based on data storage capacities, performance and reliability. In the new era, cloud providers lure in organizations with built-in cloud innovations, services and solutions. And at this week’s Google Cloud Next ’22, the tech titan made one thing clear: It wants to lead the new era. From new partners and artificial intelligence-powered solutions to workspace innovations for…

Read More

What organizations need to know about the new CPRA legislation

What organizations need to know about the new CPRA legislation

What organizations needs to know about the new CPRA legislation | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Fostering diversity in cybersecurity

Fostering diversity in cybersecurity

Fostering diversity in cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

The weaponization of social media

The weaponization of social media

The weaponization of social media | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Cybersecurity blind spots: The risks hiding in your own IT environment

Cybersecurity blind spots: The risks hiding in your own IT environment

Cybersecurity blind spots: The risks hiding in your own IT environment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Signal to remove SMS support from Android

Signal to remove SMS support from Android

Signal is phasing out SMS support from Android to enable it to focus on developing a more secure and reliable platform. Image: THAWEERAT/Adobe Stock Mobility must-reads If you’ve been relying on the Signal messaging app on Android for SMS communications, your access to the plaintext messaging feature in the app will end soon. In a bid to prioritize security and privacy, Signal has announced that it will soon phase out SMS and MMS messaging support…

Read More

Threat Modeling: Bridging the Gap Between Developers and Security Architects

Threat Modeling: Bridging the Gap Between Developers and Security Architects

By Stephen de Vries, Co-Founder and CEO of IriusRisk The application security world is known for friction between security and development teams. However, this tension can be eradicated through a development security strategy to bring developers and security architects together: threat modeling. Protection before it’s too late  Threat modeling is the act of conducting security analysis before a system is finalised, or even built, to detect weaknesses and vulnerabilities in the design of the system and…

Read More
1 2,712 2,713 2,714 2,715 2,716 4,184