Axis Communications builds cyber wall around popular IoT devices
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Various companies, start-ups and governments are leaking their own files from the cloud. This is shown by new ...
Pre-installed malware was found on more than 7.4 million Android devices. The malware was able to take over de...
The ransomware Sodin uses a zero day leak in Windows to obtain access rights to infected systems. In addition,...
Apple now offers security researchers up to $1 million ($893,000) if they find an error in iPhones. That's the...
Broadcom has announced that it is taking over Symantec's enterprise security division for $10.7 billion ($9.56...
At the beginning of April, a wish for Gemalto and Thales was finally fulfilled. The two companies then comple...
Google expands its zero-trust security model, BeyondCorp, with context-aware access capabilities in its cloud-...
In this month's Security Bulletin, Android has rolled out security updates that solve two dangerous vulnerabil...