Surface Laptop 4 showcases Microsoft’s new approach to PC security

Surface Laptop 4 showcases Microsoft’s new approach to PC security

Microsoft is bringing advanced hardware security to more Surface devices with cloud firmware management to help enterprises deploy new PCs quickly. Microsoft’s Surface Laptop 4 is the second Surface device that uses Secured-core to protect the firmware. This brings what used to be optional security features that you had to test and manage, and then built-in security designed for the industries most targeted by attackers, further into the mainstream. It’s also the first Secured-core PC available with an AMD processor (and…

Read More

6 ‘crackpot’ technologies that might transform IT

6 ‘crackpot’ technologies that might transform IT

Famous mock musician David St. Hubbins once said, “There’s a fine line between stupid and clever.” On one side of the line is an endless celebration of genius. On the other: failure and ignominy. The tech industry has no choice but to embrace innovation and risk taking. As such, some innovations start out looking crazy but end up being brilliant. Others start out looking just as crazy and implode under the weight of their own…

Read More

Hacker tools used to warn exposed Amazon Cloud Storage accounts

Hacker tools used to warn exposed Amazon Cloud Storage accounts

Responding to the all too familiar news of compromised Amazon cloud storage, security researchers have begun leaving “friendly warnings” on AWS S3 accounts with exposed data or incorrect permissions. The misconfiguration of access control on AWS storage “buckets” has been behind numerous high profile data breaches, including Verizon, The Pentagon, Uber and FedEx. Researchers have begun taking security notification into their own hands, with security advice left behind on publicly accessible storage. These warning messages come in multiple forms from multiple sources,…

Read More

Welcome to the new world of triple extortion ransomware

Welcome to the new world of triple extortion ransomware

Welcome to the new world of triple extortion ransomware | 2021-05-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Mission Possible: Hunting Down and Stopping Stealthy Attackers with MVISION XDR | McAfee Blogs

Mission Possible: Hunting Down and Stopping Stealthy Attackers with MVISION XDR | McAfee Blogs

Imagine, if you will, a scene straight out of one of your favorite impossible mission movies. The background music is driving a suspenseful beat while the antagonist attempts to steal the latest technology from a very favored industry competitor called Rad-X Incorporated. It’s a trade secret that will change the industry forever, and if the villain achieves her mission, she will hold the future of aviation in the palm of her hand. She’s bypassed laser…

Read More

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic | 2021-05-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Five recent political violence lessons from the global insurance industry

Five recent political violence lessons from the global insurance industry

Five recent political violence lessons from the global insurance industry | 2021-05-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cybersecurity Training: Raising Awareness And Securing Your Business

Cybersecurity Training: Raising Awareness And Securing Your Business

Organizations are increasingly faced with threats from sophisticated criminal organizations and nation-state actors.  To mitigate the risks posed by cyber criminals, organizations must secure and protect their proprietary and sensitive information. They must also commit to training their employees to do their part to protect proprietary and sensitive information. Cybersecurity awareness and training programs educate employees about cybersecurity threats, risks and best practices as well as how to navigate the ever-changing and evolving threat landscape. The importance…

Read More

Ghosts in the Machine – Looking at OT & IT Convergence

Ghosts in the Machine – Looking at OT & IT Convergence

There is a saying in cybersecurity that “Data is the new oil.” If that is true, then that oil is powering not only the economy but also industry. The term ‘Industry 4.0’ refers to the fourth industrial revolution where traditional manufacturing and industrial processes are increasingly using IT and data to the point that we’re now seeing the emergence of ‘smart factories.’ From the management and control of power and water to the management and…

Read More

#RSAC: Bruce Schneier Warns of the Coming AI Hackers

#RSAC: Bruce Schneier Warns of the Coming AI Hackers

Artificial intelligence, commonly referred to as AI, represents both a risk and a benefit to the security of society, according to Bruce Schneier, security technologist, researcher, and lecturer at Harvard Kennedy School. Schneier made his remarks about the risks of AI in an afternoon keynote session at the 2021 RSA Conference on May 17. Hacking for Schneier isn’t an action that is evil by definition; rather, it’s about subverting a system or a set of rules in a way that is unanticipated…

Read More
1 2,273 2,274 2,275 2,276 2,277 2,579