You Are Browsing ‘Security ’ Category

Comments Off on 6 reasons you’re failing to focus on your biggest IT security threats
(Source: CSO Online) The sheer number of security threats is overwhelming. There are 5,000 to 7,000 brand new threats a year, or about 15 a day. That's 15 brand new problems on top of yesterday's 15 brand new problems, day after day after day. It's been this way for decades, for as long as they have been tracking the stat. Computer defenders ......
Comments Off on Virtru: How These Brothers Protect The World’s Data
(Source: Forbes) Virtru is an email encryption and data security company that was founded by brothers John and Will Ackerly. Virtru's CEO John Ackerly is a former policy director for the White House during the Bush administration and was largely responsible for coordinating technology policy before and following the terrorist attacks on ......
Comments Off on Microsemi Announces its Entire Product Portfolio is Unaffected by Spectre and Meltdown Vulnerabilities
(Source: PR Newswire (press release)) As a leader in hardware security, Microsemi is well-known for its cybersecurity and malware expertise, offering customers the highest levels of design and datasecurity. Both Spectre and Meltdown affect speculative execution in modern computer chips, but they can be abused via various methods. Microsemi offers a ......
Comments Off on How Cisco attacks itself to improve security
(Source: Silicon Valley Business Journal) “Security is the threat that ties to everything we do as a company and if we truly want to be able to gain the trust of our stakeholders, we have to be ensure that we are looking after privacy and data security, not only of our own company information and data but that of our customers and partners,” Mulvany said in a ......
Comments Off on Apple’s macOS Plagued by Yet Another Password Security Flaw
(Source: eWeek) Today's topics include the release of an Apple patch for another macOS password security flaw; 147 security vulnerabilities found in mobile industrial control system applications; the release of Lenovo's Miix 630 “Always Connected PC” with Arm processors; and Google's introduction of an open-source framework for testing ......
Comments Off on VASCO Data Security International, Inc. (NasdaqCM:VDSI) Enlivened Quant Data Under the Lens as PI Touches 1.01413
(Source: DARC News) Investors are keeping a close eye on shares of VASCO Data Security International, Inc. (NasdaqCM:VDSI). The stock has a current six month price index of 1.01413. The six month price index is calculated by dividing the current share price by the share price six months ago. A ratio over one represents an increase in the ......
Comments Off on Significant regional disparity in adoption of cloud security
(Source: Information Age) The study surveyed more than 3,200 IT and IT security practitioners worldwide to gain a better understanding of the key trends in data governance and securitypractices for cloud-based services. Responding to the UK's position in these findings, Joe Pindar, director of Product Strategy, Gemalto said: “Frustratingly, with ......
Comments Off on Blackberry unveils Jarvis for self-driving and connected car security
(Source: www.v3.co.uk) Blackberry has launched an IT security software package for autonomous vehicles, called Jarvis. The software is intended to protect connected cars and self-driving vehicles from remote hijackings by hackers. Jarvis will be offered to car makers as a pay-as-you-go service, which they can use to alleviate some of the ......
Comments Off on Data security and breach notification in Finland
(Source: Lexology) Finland has no general data security law. The data security requirements are set in various laws. The Personal Data Act sets forth general data security requirements. However, the security obligations are not specific and it is the data controllers' responsibility to ensure that adequate measures are implemented....
Comments Off on New technologies needed to counter emerging crimes, Tencent boss says
(Source: Global Times) In 2018, big data security technology is expected to continue its rapid growth. Holographic visual big data technology will be integrated into Tencent's growing ecosystem of security and provide regulatory models that can be repurposed, the statement said. Ma added that China will also offer a "China solution" for cyber ......