Intel details FPGA roadmap

Intel details FPGA roadmap

Seven years after its $16.7 billion acquisition of FPGA maker Altera, Intel is expanding the technology it gained into new areas. While the primary use for an FPGA processor has been for smartNICs that offload tasks from server CPUs, Intel is now looking to broaden its application from the data center to remote, edge computing, and embedded systems. It’s not as if the Altera processors languished over the last several years, however. One major change is…

Read More

Businesses in Canada Warned Not to Overlook Cybersecurity As Recession Looms

Businesses in Canada Warned Not to Overlook Cybersecurity As Recession Looms

CEOs have been warned not to take their eye off the ball when it comes to cybersecurity following findings from KPMG International’s Global CEO Outlook Survey. When asked ‘what keeps them up at night,’ CEOs put cybersecurity seventh behind a range of other pressing near–term risks, such as the economy, a potential recession, regulatory issues and disruptive technologies. “Data breaches can cost organizations millions of dollars, and that’s not something most companies can afford in an economic…

Read More

CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy

CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy

Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access. Background On October 7, public reports began to circulate that Fortinet communicated directly with customers about a critical vulnerability in its FortiOS and FortiProxy products. This vulnerability, CVE-2022-40684, has been patched, but Fortinet has not released a full advisory yet via its Product Security Incident Response Team.  Fortinet usually follows a monthly release schedule for security…

Read More

Mona Harrington named Asst Director at CISA’s National Risk Management Center

Mona Harrington named Asst Director at CISA’s National Risk Management Center

Mona Harrington named Asst Director at CISA’s National Risk Management Center | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Randall Magiera named Director of Information Security at LucidLink

Randall Magiera named Director of Information Security at LucidLink

Randall Magiera named Director of Information Security at LucidLink | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Cisco and DISH: Delivering the Promise of 5G to Create a More Inclusive Future

Cisco and DISH: Delivering the Promise of 5G to Create a More Inclusive Future

It’s always exciting to see your customer’s vision come to fruition. It’s especially rewarding when KPIs and expectations are exceeded. We congratulate DISH Wireless for launching 5G broadband service to over 20% of the U.S. population this summer, achieving a major milestone in building America’s first and only cloud-native 5G Open RAN network. In May the DISH 5G network launched wireless service in Las Vegas. Since then, DISH has expanded service to more than 120 cities…

Read More

5 ways AI & access control data can enhance security operations

5 ways AI & access control data can enhance security operations

5 ways AI & access control data can enhance security operations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How to unlock the hidden value of security technology

How to unlock the hidden value of security technology

How to unlock the hidden value of security technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Mobile Ecosystem Forum CEO talks privacy, security and the future of the mobile industry

Mobile Ecosystem Forum CEO talks privacy, security and the future of the mobile industry

Image: Shutterstock/Funtap Must-read security coverage The Mobile Ecosystem Forum, supported by The Campaign Registry, hosted MEF Connects on the Las Vegas strip on Sept. 27. During the event, the head of the former Federal Communications Commission Chairman, Ajit Pai, spoke about new regulations that could affect the entire mobile industry, from carriers to smartphone makers. Additionally, MEF leaders addressed the changing mobile landscape, 5G and the potential of mobile identity. With over 20 years of…

Read More

What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe | McAfee Blog

What Is Smishing? Here’s How to Spot Fake Texts and Keep Your Info Safe | McAfee Blog

Your phone buzzes. You hope it’s a reply from last night’s date, but instead you get an entirely different swooping feeling: It’s an alarming SMS text alerting you about suspicious activity on your bank account and that immediate action is necessary.   Take a deep breath and make sure to read the message carefully. Luckily, your assets could be completely safe. It could just be a smisher.  Smishing, or phishing over SMS, is a tactic where…

Read More
1 2,723 2,724 2,725 2,726 2,727 4,179