ShadowHammer campaign latest to highlight dangers of supply chain attacks. Taiwanese computer maker ASUS may have inadvertently distributed malware to over 1 million users of its systems worldwide after...
Read moreA Glass Ceiling? Not in Privacy
March 25 2019According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%. The past few years have seen an explosion of data-related crises, from...
Read moreA Glass Ceiling? Not in Privacy
March 25 2019According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%. The past few years have seen an explosion of data-related crises, from...
Read moreTLS 1.3: A Good News/Bad News Scenario
March 25 2019Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic. A growing number...
Read moreTLS 1.3: A Good News/Bad News Scenario
March 25 2019Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic. A growing number...
Read moreResearchers report a now-patched DoS vulnerability in Facebook Fizz, its open source implementation of the TLS protocol. A critical denial-of-service (DoS) vulnerability was found in Facebook Fizz, the social...
Read moreResearchers report a now-patched DoS vulnerability in Facebook Fizz, its open source implementation of the TLS protocol. A critical denial-of-service (DoS) vulnerability was found in Facebook Fizz, the social...
Read moreResearchers find that companies that refurbish or accept old equipment as donations don’t necessarily clean them of data as promised. Here’s some eyepopping data about the computing devices that...
Read moreResearchers find that companies that refurbish or accept old equipment as donations don’t necessarily clean them of data as promised. Here’s some eyepopping data about the computing devices that...
Read moreHealthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that. Given the copious amounts of sensitive data coursing through...
Read more
Recent Comments