Telecom companies, FAA strike deal on 5G interference for airplanes

Telecom companies, FAA strike deal on 5G interference for airplanes

New equipment for older airplanes is the latest step forward in the ongoing dispute between the major telecom companies and the Federal Aviation Administration, as regulators agree to further measures aimed at reducing perceived safety risks caused by 5G service. The concerns center on interference—the frequencies used by radioaltimeter systems, which are an important safety feature for landing aircraft, are close to those used by some kinds of 5G services. The FAA has long expressed…

Read More

Gartner reveals 8 cybersecurity predictions for the next 4 years

Gartner reveals 8 cybersecurity predictions for the next 4 years

The cybersecurity company went into great detail on some of the sweeping cybersecurity changes anticipated over the next four years. Image: Favebrush/Adobe Stock As part of Gartner’s Security & Risk Management Summit wrapping up today in Sydney, analysts from the company have unveiled eight predictions from within the cybersecurity sphere from 2022 to 2026. Several big changes to the security landscape were forecasted by Gartner, and the analytical firm urges that cybersecurity executives build these…

Read More

Why organizations are keen on zero trust but are slow to adopt it

Why organizations are keen on zero trust but are slow to adopt it

Most organizations surveyed by Banyan Security consider zero trust a priority, but many see it as difficult and expensive to implement. Image: metamorworks, Getty Images/iStockphoto As cyberattacks have increasingly threatened organizations, zero trust has become more of a go-to method for protecting sensitive data and assets. Zero trust lets you limit access on an as-needed basis, and with the promise of greater protection, it is on the radar for many organizations. But adopting this type…

Read More

Powering a low-carbon digital Thailand

Powering a low-carbon digital Thailand

In the journey toward a low-carbon future, Thailand is the first country in the Association of Southeast Asian Nations (ASEAN) to commit to carbon neutrality. At the 2021 United Nations (UN) Climate Change Conference, commonly referred to as COP26, Thailand proposed the visionary Carbon Neutrality 2050 roadmap to address climate change, mirroring the milestone laid out by the European Union (EU). In this truly momentous journey, digitalization will play a crucial role as we work…

Read More

Connected Justice and the rapid change in technology

Connected Justice and the rapid change in technology

COVID-19 brought numerous changes to the world of government and technology while ushering in an urgency to embrace technology in every aspect of operations. Our justice system was one of the most critically affected segments of our government. One of the most resistant to technological change, the justice system was thrust into a rapid scramble to adapt to this “new normal.” County, state, and federal courts were immediately challenged to find a solution to continuing…

Read More

Maintaining cybersecurity as digital identities expand

Maintaining cybersecurity as digital identities expand

<!– Maintaining cybersecurity as digital identities expand | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Per Mar Security remains resilient as threats evolve

Per Mar Security remains resilient as threats evolve

As an early adopter of Cisco Secure Endpoint, Per Mar Security Services has seen the product evolve alongside the threat landscape. According to Dan Turner, CIO at Per Mar, the evolution of the Cisco security portfolio has helped the company remain cyber resilient during the pandemic and beyond. We recently spoke with Turner to discuss how Per Mar uses Cisco technology to rapidly detect and mitigate threats, while still enabling employees to work from wherever…

Read More

API insecurity costing the US billions annually

API insecurity costing the US billions annually

<!– API insecurity costing the US billions annually | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How the Cloud Upended Security – and How Encryption Helps Restore It

How the Cloud Upended Security – and How Encryption Helps Restore It

By Tilo Weigandt, co-founder, Vaultree Data is everywhere and anywhere, and as a result, data management is out of control. Once a user or customer has signed up for a service or purchased a product, they usually have no idea about where their data is being stored, with whom it is shared or how it is secured. The adoption of cloud services – while very beneficial in many ways – have made it nearly impossible…

Read More

Proofpoint: Social engineering attacks slipping past users

Proofpoint: Social engineering attacks slipping past users

Some of the most effective tricks used for social engineering attacks are being overlooked or underestimated. That’s according to security vendor Proofpoint, whose 2022 Social Engineering report concluded that many companies mistakenly assume that cybercriminals are unwilling or unable to use tactics such as extended conversations, legitimate services and hijacked email threads in order to dupe their targets into opening malware and following phishing links. Proofpoint, which specializes in tools and services to counter…

Read More
1 2,915 2,916 2,917 2,918 2,919 4,093