The Latest in IT Security

1

The Titan Security Key is designed to help users protect themselves against phishing attacks and account takeover by using FIDO standards for two-factor authentication (2FA). The product uses cryptography to verify the user’s security key and address when they log in to their account. The problem impacts the Bluetooth Low Energy (BLE) version of T1 […]

Read more ...

1

Roughly one year ago, Gjoko Krstic, a researcher at industrial cybersecurity firm Applied Risk, started analyzing building management (BMS), building automation (BAS) and access control products from Nortek, Prima Systems, Optergy, and Computrols. The products include Computrols CBAS-Web, Optergy Proton/Enterprise, Prima FlexAir, and two Nortek Linear eMerge products. Krstic has identified a total of over […]

Read more ...

1

The biggest cybersecurity challenge in enterprise remains keeping ahead of the “bad guys.” As fast as security gaps are plugged, new vulnerabilities appear and are targeted for the next attack. Criminals have been using automation for some time, leveraging tools like AutoSploit to automate internet scanning and exploitation, or Sentry MBA for credential stuffing by […]

Read more ...

Categories

TUESDAY, MAY 21, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks