Axis Communications builds cyber wall around popular IoT devices
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Box, a specialist in the field of cloud-based content management and cloud storage, has recently updated its ...
Using a 3D printed fingerprint, Cisco Talos security researchers succeeded in passing the fingerprint scanner...
An increase of twenty percent was detected for ransomware in February compared to a month earlier. Cybersecur...
Of a dozen vulnerabilities found in HP Support Assistant, three are still present in the standard software in...
Extensive academic research has discovered hidden backdoors in 12,706 Android applications. These include sec...
Researchers of security specialist Aqua Security have found that hackers have been scanning Docker instances ...
Not only people who work from home because of the corona virus are targeted by cyber attacks, hospitals are a...
Videocall app Zoom was already under a magnifying glass in the United States at the end of March, after quest...
AWS has now made its security service Detective generally available. With Detective, companies can use artifi...
Researchers from security company Check Point Software Technology have noticed a strong increase in the numbe...