The Latest in IT Security

1

Digital transformation continues to be a priority as organizations realize the potential business benefits of becoming a digital organization. The internal efficiencies gained often mean improving the speed to market for new products, and a deeper level of customer engagement and satisfaction. However, this kind of transformation also means a change in the complexity of […]

Read more ...

1

How can you be sure the “secure” USB drive you’re using is really secure and the data you store on it can’t be extracted? That’s exactly the question Google’s security researchers Ellie Bursztein, Jean-Michel Picod, and Rémi Audebert addressed in their talk, “Attacking encrypted USB keys the hard(ware) way,” at the recent Black Hat USA 2017.

Read more ...

1

Cisco fixed 15 vulnerabilities this week in more than a dozen products, including two high severity vulnerabilities that could have let an attacker trigger a denial of service condition or bypass local authentication. The more severe bugs fixed on Wednesday exist in the company’s Identity Services Engine and its Videoscape Distribution Suite. The bypass, which […]

Read more ...

1

The cybersecurity market has spawned a cottage industry of new industrial control systems (ICS) and industrial Internet of Things (IIoT) companies over the past few years. These pure-plays focus primarily or exclusively on cyber-defending power grids, nuclear power plants, Supervisory Control and Data Acquisition (SCADA) systems, operational technology (OT) infrastructures, and industries covering chemicals, manufacturing, […]

Read more ...

Categories

SUNDAY, SEPTEMBER 24, 2017

Featured

Archives

Latest Comments

Social Networks