Security News > 2020 > August

French President Emmanuel Macron says France is not excluding Chinese telecom giant Huawei from its upcoming 5G telecommunication networks but favors European providers for security reasons. France's information security agency ANSSI said last month that Huawei Technologies Ltd. will not be banned from France, but French telecoms operators that buy its technology will only be able to get licenses limited to eight years.

More attention should be dedicated to strange login times and locations so that cloud and SaaS account compromises do not result in company-wide damage. Since the unusual login location was accompanied by an unusual login time, the actions triggered a deeper analysis from my team.

Cisco over the weekend published information on a vulnerability in the IOS XR software that could be exploited to cause a denial of service condition. Cisco has warned that attackers are already attempting to exploit the vulnerability.

Our recent articles and videos, all in one place.

Microsoft has published a new security baseline for Microsoft Edge and one of the new rules is titled "Allow certificates signed using SHA-1 when issued by local trust anchors." Which may surprise some readers seeing as the United States National Institute of Standards and Technology deprecated SHA-1 in 2011 and Microsoft banished it from its Internet Explorer and Edge browsers in 2017.

Seny Kamara gave an excellent keynote talk this year at the (online) CRYPTO Conference. He talked about solving real-world crypto problems for marginalized communities around the world, instead of...

You need to recognize the most critical cloud security challenges and develop a strategy for minimizing these risks. With that in mind, let's dive into the five most pressing cloud security challenges faced by modern organizations.

How does Qualys Multi-Vector EDR differ from traditional EDR solutions? Qualys Multi-Vector EDR leverages the strength of EDR while also extending the visibility and capabilities beyond the endpoint to provide a more comprehensive approach to protection.

The operational level is focused on aligning to governance protocols like risk thresholds, delivery timelines, and automation during the build phases of business value creation. The end of the line in any process is where the actual customer that receives the value from a product or service experiences the touchpoint with your portfolio of valued items.

The new technique provides possibility to analyze data directly on compressed files, and it may have a major impact on the so-called "Data tsunami" from massive amounts of IoT devices. "Today, if you need just 1 Byte of data from a 100 MB compressed file, you usually have to decompress a significant part of the whole file to access to the data. Our technology enables random access to the compressed data. It means that you can access 1 Byte data at the cost of only decompressing less than 100 Bytes, which is several orders of magnitude lower compared to the state-of-the-art technologies. This could have a huge impact on data accessibility, data processing speed and the cloud storage infrastructure," says Associate Professor Qi Zhang from Aarhus University.