News
  • "Four Ways to Empower Your Employees through Security Awareness Training"
    For IT professionals, creating and implementing a flawless cybersecurity plan is the ideal situation. However, due to lack of resources, companies focus more on implementing sound processes and policies rather than the human error of their employees.…
  • “Cyber Risks Loom for Energy Sector”
    Cyberattacks pose the greatest threat to the U.S. energy sector as indicated by an upcoming Energy Department report in which the relative hazards and impacts of natural disasters and cyberattacks are compared. The U.S. has been urged by the White House…
  • "Cloud Vulnerabilities Are Being Ignored by the Enterprise"
    An annual report on cloud security has been released by RedLock, which indicates that security practices pertaining to the use of cloud services are still being overlooked by many organizations. According to the report, many organizations that use …
  • “Mini Crypto Chip Is a Self-Contained Encryption Engine”
    The Mini Crypto Chip is an independent encryption engine used by the Air Force to protect communications and sensitive data transmitted between systems from the interception of adversaries. Mini Crypto has been designed to be physically small and easy to…
  • “Google Reveals Critical Flaws In Dnsmasq Software Packages”
    Google security researchers have discovered seven different critical security vulnerabilities within the Dnsmasq software package, which largely impacts millions of Android phones, home routers, desktops, and other IoT devices. Dnsmasq is an open-source…
  • “DHS Cyberinsurance Research Could Improve Security”
    The Department of Homeland Security (DHS) is conducting research to discover the potential improvements of cybersecurity that would be provided by cyberinsurance. Research is being performed through the collection of breach data into DHS’s Cyber Incident…
  • "5 IT Practices That Put Enterprises at Risk"
    Although there is no single solution or method to completely safeguard organizations from cyberthreats as such threats continue to grow in sophistication, there are five IT practices that companies could avoid in order to improve upon their security…
  • “Woefully Inadequate IT Processes for Managing User Accounts and Access Continue to Create Major Security and Compliance Risks”
    Findings of a study conducted by Dimensional Research and released by One Identity indicate significant inadequacies in the management of user accounts by organizations, which pose great risks to security and compliance. The survey reveals the…
  • “New Research Details the Privacy Implications of Email Tracking”
    A study conducted by researchers at Princeton University highlights the extensiveness of email tracking and how this form of snooping could significantly impact the privacy of users. According to researchers, most emails are embedded with third…
  • "AI Now Detects the Majority of New Malware on Android"
    There has been a significant increase in the detection of new malware on Android devices through the utilization of machine learning by Google. The implementation of machine learning into Google Play Protect, an automated application security software…
  • “How Attackers Can Take Advantage of Encrypted Tunnels”
    As indicated by a survey conducted by Venafi, many organizations often neglect to examine encrypted traffic within their networks. As the encryption of traffic by organizations as well as the use of machine identities increases, the risk of…
  • "Strengthening the Cybersecurity of the Grid"
    The enhanced connectivity that accompanies the continued modernization of the U.S. electricity grid ignites concerns as advancements in computing and communications technologies for grid operators and consumers are expected to increase the possibility of…