The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

The fight against cyber threats requires a public-private partnership. Here’s how to get it done. | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors

5 minutes with Bryce Webster-Jacobsen – What the new CMMC Framework means for defense contractors | 2021-03-08 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

The Humanity and Evolution of Cyber – a look at its origin and usage

The Humanity and Evolution of Cyber – a look at its origin and usage

We see the word “cyber” everywhere today. It’s included in all the hashtags, events names and even in hand sanitizer available for purchase at Toys ‘R Us: Cyber Clean (72% ethanol alcohol, with aloe.) With the market booming and the buzzword exploding, many of us still don’t understand what this vague word means. We’re simply toeing the line, either reluctantly when our IT department sends out a reminder to complete our annual security training or…

Read More

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN

By Krupa Srivatsan, Director, Cybersecurity Product Marketing at Infoblox With the remote working trend on the rise due to the COVID-19 pandemic, many IT managers and corporate leaders have naturally been concerned about the challenges of securing employee’s access to the corporate network. Given the precipitous nature of the pandemic, organizations have had very little time to prepare for such large-scale remote work, let alone think about how to securework from home’ users. These remote…

Read More

Working from Home? You’re Not Alone

Working from Home? You’re Not Alone

The rise of cyber hacks in an age of remote working – and how to prevent them By Steve Hanna, Embedded Systems Work Group Co-Chair at Trusted Computing Group (TCG) and Jun Takei, Japan Regional Forum Co-Chair at Trusted Computing Group Technology is replacing a number of real-life activities, helping to maintain a level of normalcy and connection with familiar faces amid unprecedented times. As remote working continues to prove an ever-essential trend in light…

Read More

Call the Doctor! mHealth Apps are Exposing Medical Records

Call the Doctor! mHealth Apps are Exposing Medical Records

By George McGregor, VP of Marketing, Approov A new report by Knight Ink, sponsored by Mobile API Security firm Approov describes how thirty leading mHealth applications were tested and everyone contained a vulnerability that exposed private patient data. If you have published a mobile healthcare app, you should be worried and this report should be essential reading. In this case, a medical practitioner may not be able to help you, but applying better security practices…

Read More

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users | McAfee Blogs 5 Tips for Protecting Your Data From SuperVPN Vulnerabilities | McAfee Blog

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users | McAfee Blogs 5 Tips for Protecting Your Data From SuperVPN Vulnerabilities | McAfee Blog

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users To live our digital lives to the fullest, we rely on a variety of technologies to support our online activities. And while some apps and devices are meant to make certain tasks more convenient or provide us with greater security, others simply offer a false sense of security and could potentially lead to online misfortune. One such platform is SuperVPN. While…

Read More

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users | McAfee Blogs 5 Tips for Protecting Your Data From SuperVPN Vulnerabilities | McAfee Blog

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users | McAfee Blogs 5 Tips for Protecting Your Data From SuperVPN Vulnerabilities | McAfee Blog

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users To live our digital lives to the fullest, we rely on a variety of technologies to support our online activities. And while some apps and devices are meant to make certain tasks more convenient or provide us with greater security, others simply offer a false sense of security and could potentially lead to online misfortune. One such platform is SuperVPN. While…

Read More

Money for nothing: Making sense of data collaborations in healthcare

Money for nothing: Making sense of data collaborations in healthcare

Several leading health systems got together recently to announce the formation of Truveta, an independent company that will pool patient medical records from the participating health systems and analyze them for insights to drive healthcare outcomes. The announcement highlighted the benefits of sharing de-identified data for driving research, new therapies, and improved health outcomes. In an initiative launched last year, UC San Francisco (UCSF) has created a data platform titled the UCSF Health Atlas that…

Read More

The Fastest Route to SASE | McAfee Blogs

The Fastest Route to SASE | McAfee Blogs

Shortcuts aren’t always the fastest or safest route from Point A to Point B. Providing faster “direct to cloud” access for your users to critical applications and cloud services can certainly improve productivity and reduce costs, but cutting corners on security can come with huge consequences. The Secure Access Service Edge (SASE) framework shows how to achieve digital transformation without compromising security, but organizations still face a number of difficult choices in how they go…

Read More
1 2,457 2,458 2,459 2,460 2,461 2,643