How to protect against rising social media threats

How to protect against rising social media threats

How to protect against rising social media threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Hollywood offers leadership lessons

Hollywood offers leadership lessons

Hollywood offers leadership lessons | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

How the pandemic forces the security industry to modernize

How the pandemic forces the security industry to modernize

How the pandemic forces the security industry to modernize | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

5 minutes with James Turgal: Risk management, business continuity and succession plans

5 minutes with James Turgal: Risk management, business continuity and succession plans

5 minutes with James Turgal: Risk management, business continuity and succession plans | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Codex Exposed Exploring the Capabilities and Risks of OpenAIs Code Generator

Codex Exposed Exploring the Capabilities and Risks of OpenAIs Code Generator

While GPT-3, the general-purpose language transformer that powers Codex, has recently been opened to the public, Codex itself remains a technical preview open to a limited selection of users. Codex powers the functionality of GitHub’s Copilot, a programming assistant available as a plug-in for Visual Studio Code that is able to offer AI-powered autocomplete and code translation on the fly. Its capabilities are still rough around the edges, but they give a good idea of…

Read More

Organized Cybercrime Cases: What CISOs Need to Know

Organized Cybercrime Cases: What CISOs Need to Know

Organized Cybercrime Cases: What CISOs Need to Know Risk Management Jon Clay, VP of Threat Intelligence at Trend Micro, explores the latest Trend Micro Research covering Access as a Service (AaaS), an emerging business model selling all-access passes to other malicious actors. By: Jon Clay January 07, 2022 Read time:  ( words) What is access as a service? Recently, Trend Micro Research analyzed a new service offering, called Access as a Service (AaaS), in the…

Read More

This Week in Security News – January 7, 2022

This Week in Security News – January 7, 2022

Read on: Are Endpoints at Risk for Log4Shell Attacks The end of 2021 saw the emergence of the Log4Shell (CVE-2021-44228) vulnerability, a critical vulnerability in the ubiquitous Java logging package Apache Log4j. Exploiting Log4Shell via crafted log messages can allow an attacker to execute code on remote machines. The potential impact of this vulnerability is great enough that it scores a 10.0 rating based on CVSS version 3.x and a 9.3 rating based on CVSS…

Read More

10 Experts on the Biggest Problems Tech Needs to Solve

10 Experts on the Biggest Problems Tech Needs to Solve

By Milan Shetti, CEO Rocket Software In the past year, we have experienced a global pandemic, social justice trials, political reforms and much more. As business leaders, we are usually concerned with finding solutions to answer our companies’ specific problems. We often don’t take a minute to look at the bigger picture of how we can aid today’s biggest global challenges through digital technology. At Rocket Software, we are led by our core values of…

Read More

“Owning Your Identity” Through Biometric and Passwordless Innovations

“Owning Your Identity” Through Biometric and Passwordless Innovations

By Bob Eckel, CEO, Aware Consumers around the world have become increasingly comfortable engaging with businesses digitally. Between 2020 and 2021, driven in part by the pandemic, the proportion of U.S. consumers using digital financial services grew from 58 percent to 88 percent. Ecommerce has also grown significantly, especially when it comes to mobile commerce; Forbes reports that by the end of 2021 mobile will make up about 73 percent of all ecommerce sales, up…

Read More

Covid Test Data Breach at British School

Covid Test Data Breach at British School

A mix-up at a school in Worcestershire, England, caused parents to receive the Covid-19 test results of other people’s children. The data breach, reported today by the Evesham Journal, occurred at co-educational secondary school and sixth-form college The De Montfort School (TDMS) in Evesham, which is part of the Four Stones Multi Academy Trust. Students returning to learning after the holiday season underwent asymptomatic testing for the coronavirus at TDMS on Tuesday. In a security incident…

Read More
1 3,375 3,376 3,377 3,378 3,379 4,375