The Humanity and Evolution of Cyber – a look at its origin and usage

The Humanity and Evolution of Cyber – a look at its origin and usage

We see the word “cyber” everywhere today. It’s included in all the hashtags, events names and even in hand sanitizer available for purchase at Toys ‘R Us: Cyber Clean (72% ethanol alcohol, with aloe.) With the market booming and the buzzword exploding, many of us still don’t understand what this vague word means. We’re simply toeing the line, either reluctantly when our IT department sends out a reminder to complete our annual security training or…

Read More

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN

By Krupa Srivatsan, Director, Cybersecurity Product Marketing at Infoblox With the remote working trend on the rise due to the COVID-19 pandemic, many IT managers and corporate leaders have naturally been concerned about the challenges of securing employee’s access to the corporate network. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to securework from home’ users. These remote…

Read More

Working from Home? You’re Not Alone

Working from Home? You’re Not Alone

The rise of cyber hacks in an age of remote working – and how to prevent them By Steve Hanna, Embedded Systems Work Group Co-Chair at Trusted Computing Group (TCG) and Jun Takei, Japan Regional Forum Co-Chair at Trusted Computing Group Technology is replacing a number of real-life activities, helping to maintain a level of normalcy and connection with familiar faces amid unprecedented times. As remote working continues to prove an ever-essential trend in light…

Read More

Call the Doctor! mHealth Apps are Exposing Medical Records

Call the Doctor! mHealth Apps are Exposing Medical Records

By George McGregor, VP of Marketing, Approov A new report by Knight Ink, sponsored by Mobile API Security firm Approov describes how thirty leading mHealth applications were tested and everyone contained a vulnerability that exposed private patient data. If you have published a mobile healthcare app, you should be worried and this report should be essential reading. In this case, a medical practitioner may not be able to help you, but applying better security practices…

Read More

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users | McAfee Blogs 5 Tips for Protecting Your Data From SuperVPN Vulnerabilities | McAfee Blog

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users | McAfee Blogs 5 Tips for Protecting Your Data From SuperVPN Vulnerabilities | McAfee Blog

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users To live our digital lives to the fullest, we rely on a variety of technologies to support our online activities. And while some apps and devices are meant to make certain tasks more convenient or provide us with greater security, others simply offer a false sense of security and could potentially lead to online misfortune. One such platform is SuperVPN. While…

Read More

Xilinx announces new line of adaptable SmartNIC cards

Xilinx announces new line of adaptable SmartNIC cards

One thing is clear about Xilinx: It isn’t waiting around for is acquisition by AMD to close. The latest initiatives from the company are a new SmartNIC card and an FPGA platform app store that features ready-to-deploy solutions for the card aimed at key markets, such as data analytics, video and image processing, machine learning, and security. The new Alveo SN1000 line features integrated “composability” features that allow for customization. Enterprise users can add their…

Read More

Enterprise networking trends in 2021: Preparing for the new normal

Enterprise networking trends in 2021: Preparing for the new normal

A year into the coronavirus pandemic, IT continues to support remote employees. As organizations begin planning to bring workers back into the office, IT must now consider upgrading their networks to best support employees in a post-COVID world. IDC Senior Research Analyst for enterprise networking, Brandon Butler, joins Juliet to discuss what permanent changes IT should implement as workers prepare to return to the office, and how these changes differ from the temporary solutions put…

Read More

Money for nothing: Making sense of data collaborations in healthcare

Money for nothing: Making sense of data collaborations in healthcare

Several leading health systems got together recently to announce the formation of Truveta, an independent company that will pool patient medical records from the participating health systems and analyze them for insights to drive healthcare outcomes. The announcement highlighted the benefits of sharing de-identified data for driving research, new therapies, and improved health outcomes. In an initiative launched last year, UC San Francisco (UCSF) has created a data platform titled the UCSF Health Atlas that…

Read More

Threat Roundup for February 26 to March 5 – Cisco Blogs

Threat Roundup for February 26 to March 5 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 26 and March 5. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive…

Read More

The Fastest Route to SASE | McAfee Blogs

The Fastest Route to SASE | McAfee Blogs

Shortcuts aren’t always the fastest or safest route from Point A to Point B. Providing faster “direct to cloud” access for your users to critical applications and cloud services can certainly improve productivity and reduce costs, but cutting corners on security can come with huge consequences. The Secure Access Service Edge (SASE) framework shows how to achieve digital transformation without compromising security, but organizations still face a number of difficult choices in how they go…

Read More
1 6 7 8 9 10 268