Ensuring cybersecurity of your business becomes a bigger challenge every year. Cybercriminals perform new attacks, exploit new vulnerabilities, and perform new attacks on a constant basis while regulatory institutions change and improve standards. Your task is to be fully prepared to face these challenges. So today, we gathered the top 10 cybersecurity hot topics you’d […]
Modern central processing units (CPUs) rely heavily on speculative execution to help end users complete tasks faster. With it, the CPU will try to predict what work is going to be done before it needs to do that work. If the prediction is wrong and, therefore, the results are not needed, the CPU will simply […]
On March 21, 2018, Mark Papermaster, the Chief Technology Officer of semiconductor manufacturer Advanced Micro Devices (AMD) responded to the claims of security vulnerabilities in their chipsets. The initial report, made by researchers from CTS Labs on March 12, claimed that they uncovered 13 vulnerabilities in the Platform Security Processor (PSP) and Promontory chipsets used […]
By Adam Stern A common goal of IT departments across organizations and industries is to maximize performance and speed of their performance and infrastructure. But, of course, it’s not only IT that is affected by this goal, and HR professionals must realize that they depend on this infrastructure as well.
By Jack Wallen There could be a chance that end users at your organization have installed the Maxthon browser on their mobile devices. If so, you may want to advise them to uninstall it immediately. While it may be an overreaction, you can’t be too careful when it comes to cybersecurity.