Is the Edge Really Secure?

Is the Edge Really Secure?

By Chetan Venkatesh, CEO and Co-Founder of Macrometa The simplest answer is… No. But, if history has taught security professionals anything it’s that the most secure network is the one without any users. It also happens to be the least useful of networks.   So what are we actually asking when we discuss security and the edge? Most often, the question is usually hiding the subtext of:   “In a new deployment methodology involving edge…

Read More

Application Modernization and Other Best Practices of Securing Legacy Infrastructures

Application Modernization and Other Best Practices of Securing Legacy Infrastructures

By Roman Davydov, Technology Observer, Itransition Legacy systems continue to play a vital role in the operations of many enterprises. However, over time, things like poor user adoption, increased maintenance costs, frequent errors and downtime significantly reduce the value of such digital solutions. The situation may be even worse if we look at legacy software from the cybersecurity perspective. Legacy vulnerabilities pose one of the biggest enterprise cyber threats; experts state that any software that…

Read More

Cyber-attack Response Takes More than Two Working Days

Cyber-attack Response Takes More than Two Working Days

Organizations around the world take on average more than two business days to respond to a cyber-attack, according to new research by American cybersecurity company Deep Instinct.  The finding was published in the company’s second bi-annual Voice of SecOps Report, which was based on a survey of 1,500 senior cybersecurity professionals in 11 countries who work for businesses with more than 1,000 employees and annual revenue north of $500m.  The survey revealed the average global response time…

Read More

Dutch police warn customers of a popular DDoS booter service

Dutch police warn customers of a popular DDoS booter service

Dutch police warn customers of a distributed denial-of-service (DDoS) website of stopping using the service to avoid prosecution. Dutch police warn customers of a booter service, abused to carry out distributed denial-of-service (DDoS) attacks, of to stop using it to avoid prosecution. The letter sent by the Dutch Police aims to work as a deterrent for cybercriminal activities explaining to them the consequence of prosecution due to criminal activities. The Dutch authorities have already contacted…

Read More

Researchers Condemn Apple’s Proposed Phone-Scanning Features

Researchers Condemn Apple’s Proposed Phone-Scanning Features

Apple’s plans to implement new phone-scanning features have been heavily criticized by more than a dozen cybersecurity experts. The tech company announced in August its intention to start scanning iPhone users’ iCloud Photos libraries. Apple presented the move under the pretext that it would locate users’ caches of illicit content, including child sexual abuse material (CSAM). In September, after its plans to introduce the new technology were widely condemned, Apple said the launch of the phone-scanning feature would…

Read More

The White House’s international summit on ransomware: Biggest cybersecurity takeaways

The White House’s international summit on ransomware: Biggest cybersecurity takeaways

This week the White House held a summit with various nations to address the threat of ransomware. Experts weigh in on the important security takeaways and why certain nations were excluded. Image: Shutterstock/Peshkova The White House held a virtual ransomware summit this week with over 30 countries in attendance—although a few notable nations were excluded, such as China, Russia and North Korea. Australia, Brazil, Canada, France, Germany, India, Japan, United Arab Emirates and the United…

Read More

See How This Software Dev Team Builds a Great User Experience

See How This Software Dev Team Builds a Great User Experience

There is a traditional saying in Spanish: “Todo entra por los ojos.” The literal translation is something like everything enters through the eyes. A better explanation is that smell, sight, taste, touch, and hearing are fundamental to how human beings experience life. The information provided by each sense is interpreted in our brains, used to perceive the environment, and interact with other people. But I digress. Going back to “everything enters through the eyes,” when we…

Read More

Windows Subsystem for Linux is ready for Windows 11

Windows Subsystem for Linux is ready for Windows 11

Microsoft has just made the Windows Subsystem for Linux (WSL) available in the Microsoft Store for Windows 11 systems. WSL is the application that allows Windows users to run a GNU/Linux environment directly on Windows without the overhead of a virtual machine or dual-boot setup. One good aspect is that it installs as a separate app, decoupled from the OS. This means that users can update the app without having to wait for Windows OS…

Read More
1 3,480 3,481 3,482 3,483 3,484 4,290