Security News & Reviews - Page 5

More Security News

Intel Foreshadow Processor Vulnerability

How to Protect Data Centers Against Foreshadow Intel Processor Attacks

NEWS ANALYSIS: For most users of Intel processors, the fix that will prevent Foreshadow attacks from working is already available, but there are still steps that must be taken to be safe.
Facebook Stamos

Facebook Issues $1M in Cyber-Security Defense Awards

Facebook has lived up to a pledge made a year ago to invest in cyber-security research that helps to improve the internet.

TrueVault Expands Security Platform for Regulatory Compliance

TrueVault looks to help organizations meet regulatory compliance including GDPR and the upcoming California Consumer Privacy Act.
RSA fraud

Rogue Mobile Apps Leading Global Rise in Fraud, RSA Reports

RSA has released its second-quarter 2018 fraud report, finding increasing risks from mobile apps and devices.

Intel SGX at Risk From Foreshadow Speculative Execution Attack

Another set of side-channel, speculative execution vulnerabilities have been publicly reported by security researchers; this time the vulnerabilities take specific aim at SGX secure enclave and hypervisor isolation boundaries.

Why 2018 Has Been a Landmark Data Privacy Year

Research reveals how Americans feel about digital activity monitoring in the workplace and steps public and private sector organizations can take to gain the support of employees and to avoid violating their privacy.
 Fraunhofer researchers

Researchers Reveal Security Vulnerabilities in Tracking Apps

At Defcon, security researchers revealed 37 new vulnerabilities in tracking apps that could have enabled attackers to steal information and track users.
Daily Tech Briefing Aug. 14, 2018

Election Officials Detail How to Improve Voting System Security VIDEO

DAILY VIDEO: Election officials discuss efforts to bolster voting system security, and Cisco brings SD-WAN to 1 million edge routers.
NSA Stress and Hacking Black Hat USA 2018

NSA Research Looks at How Stress Impacts Cyber-Security Operations

At Black Hat USA, officials from the National Security Agency provided insight into the impact of fatigue and frustration on cyber-security operations.

UA: A Routine Bug Fix That Can Increase Enterprise Revenue

Universal Acceptance (UA) is the concept of removing all technical barriers that might hinder a user from accessing any name in any top-level domain (TLD) from any web browser, email client or other internet application on a connected device.

TradeIt Partners with IBM Cloud for Global Financial Services

TradeIt’s home-developed APIs (application programming interface) for app developers are setting the table for highly secure functionality that covers any type of international trade format.

DHS Using Red Team Approach to Improve National Cyber-Security

Leaders of the Department of Homeland Security (DHS) National Cybersecurity Assessments and Technical Services (NCATS) explain at DEF CON about how conducting penetration testing against government and private sector infrastructure helps to improve cyber-resilience.

Enterprise Tech Videos