AMD Processors Contain Serious Vulnerabilities

On the heels of the Meltdown and Spectre vulnerabilities that affected Intel processors, a security research firm has released a report detailing exploits they’ve uncovered in AMD processors. The controversial report, produced by CTS Labs, a cybersecurity consultancy firm, alleges that 13 vulnerabilities exist in the AMD Platform Security Processor (PSP), used in the company’s […]


Adapt BYOD Policy to Account for Tech and Culture Change

Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.


Tips to Improve Your Cybersecurity Posture

It may be hard to believe, but according to a new report barely over one-half (just 56%) of companies have an overall information security strategy. Given the huge importance of data security, it’s important that companies be prepared—here are a few things to consider.


How IT Security Audits Benefit Your Business Process

In the IT industry, engineers and specialists are constantly bracing themselves against a security breach on their system. Any situation of this sort may result in data loss and operations shutting down. These are very serious problems that no enterprise can afford because they can cause irreparable damage to a company’s financial resources, business competitiveness, […]


BlackBerry Begins Licensing Its Security Technology

You probably won’t be getting a BlackBerry for your next device, but its software may be on your next phone. As the company’s strategy has shifted, BlackBerry is now licensing its security technology to third-party phones and other smart devices.


Social Engineering Means Cybersecurity Depends on Human Resources

Some believe that our increasing reliance on technology has lessened the importance of humans in today’s workplace, but just the opposite is true. Although technology can help us work more efficiently, humans remain the central motor that drives all endeavors forward. This means human resources (HR) must play a role in cybersecurity.


TSA Chief: Security Needs to Move Beyond Checkpoints

Anyone who travels by air is very familiar with airport security checkpoints. But are they effective against new threats? The head of the Transportation Security Administration (TSA) says that aviation security needs to shift away from checkpoints and toward more public areas of airports to adapt after recent attacks.

Computer developer

New Microsoft Driver Security Guidance Released

At the end of February, Microsoft unveiled its new Driver Security Guidance for Windows driver developers. The guidance is designed to help developers avoid or prevent the issues associated with a driver being attacked.