On the heels of the Meltdown and Spectre vulnerabilities that affected Intel processors, a security research firm has released a report detailing exploits they’ve uncovered in AMD processors. The controversial report, produced by CTS Labs, a cybersecurity consultancy firm, alleges that 13 vulnerabilities exist in the AMD Platform Security Processor (PSP), used in the company’s […]
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
Over the last decade, Silicon Valley’s constant drive to innovate has led to the development of ever-faster, more powerful ultra-portable devices such as tablets and smartphones. These network-hungry devices are ever-present, with more and more employees expecting mobility as part of their day-to-day work life.
It may be hard to believe, but according to a new report barely over one-half (just 56%) of companies have an overall information security strategy. Given the huge importance of data security, it’s important that companies be prepared—here are a few things to consider.
In the IT industry, engineers and specialists are constantly bracing themselves against a security breach on their system. Any situation of this sort may result in data loss and operations shutting down. These are very serious problems that no enterprise can afford because they can cause irreparable damage to a company’s financial resources, business competitiveness, […]
You probably won’t be getting a BlackBerry for your next device, but its software may be on your next phone. As the company’s strategy has shifted, BlackBerry is now licensing its security technology to third-party phones and other smart devices.
Some believe that our increasing reliance on technology has lessened the importance of humans in today’s workplace, but just the opposite is true. Although technology can help us work more efficiently, humans remain the central motor that drives all endeavors forward. This means human resources (HR) must play a role in cybersecurity.
At the end of February, Microsoft unveiled its new Driver Security Guidance for Windows driver developers. The guidance is designed to help developers avoid or prevent the issues associated with a driver being attacked.
As people become more dependent on computers and mobile devices for their personal and professional tasks, the risks associated with these technologies also increase. In the workplace alone, threats such as ransomware and malware, among others, can affect monumental results.
Water utility networks and control systems were recently targeted by hackers in Europe, highlighting the growing cybersecurity threat to infrastructure. The attack was of particular interest because the culprit was somewhat unusual—cryptocurrency mining software.
U.S. Attorney General (AG) Jeff Sessions recently announced the formation of a new cybersecurity task force under the U.S. Department of Justice. The Cyber-Digital Task Force will combat global cyberthreats and identify how federal law enforcement can more effectively accomplish this mission.