Security News > 2020 > August

77 percent of IT professionals believe they were prepared to manage the rapid shift to remote work during the COVID-19 outbreak, according to TeamViewer. 49 percent indicated that their volume of work "Stayed the same" with another 32 percent noting that it was "Higher than usual."

China is now blocking encrypted HTTPS traffic that uses TLS 1.3 with ESNI enabled, according to observers at the Great Firewall Report. While TLS hides the content of a user's communication, it cannot always hide the server they are communicating with because its handshake optionally contains a Server Name Indication field designed to explain where traffic is going.

China is now blocking encrypted HTTPS traffic that uses TLS 1.3 with ESNI enabled, according to observers at the Great Firewall Report. While TLS hides the content of a user's communication, it cannot always hide the server they are communicating with because its handshake optionally contains a Server Name Indication field designed to explain where traffic is going.

HR data is one of the highest risk types of information stored by an organization given that it contains everything from basic contractor details and employee demographics to social security numbers and medical information. Securing HR-related data needs to be approached from both a technical and end user perspective.

Contact-tracing applications require employers to collect all kinds of employee health data that they never had to worry about before - temperatures, health symptoms and travel history, for example - and they aren't sure how to use and protect this data in a way that balances health and safety with privacy. To help get you started on the right path, here is a 10-point plan for securing PII, including new employee health data collected through COVID-19 contact-tracing applications and other healthcare tracking systems.

Facebook has announced the availability of Pysa, an open-source tool designed for the static analysis of Python code. The security-focused tool relies on Pyre, Facebook's type checker for Python, and allows for the analysis of how data flows through code.

CyberSaint announced new CyberStrong platform updates that allow security and risk leaders to deliver clear narratives around their cybersecurity and IT risk management strategies. "CyberSaint's vision is a key reason why partnering with the team is so exciting for us," stated Kerri Keller, Consulting Risk Leader and Senior Manager at EY. "For our joint customers, the CyberStrong platform's automation, alignment with industry standards, and ease of deployment have been paramount to their success. Our enterprise CISO partners want to create narratives around their strategic plans for compliance and risk management initiatives, proposed solutions, return on security investment, and most importantly business enablement."

MiniTool Software has released the latest MiniTool Power Data Recovery 9.0, aiming to make specific location recovery available and save the recovery time. When the desktop files are missing for some reason, like black screen of death , the newly added Desktop Recovery feature of Power Data Recovery 9.0 can deep scan and display the lost & deleted files on desktop.

The ioXt Alliance announced that major technology companies and manufacturers including Google, T-Mobile, Silicon Labs and more, certified a wide range of devices through the ioXt Alliance Certification Program. The ioXt Alliance is backed by the biggest names in tech and is the only organization positioned to handle the rapidly increasing demand for IoT device certifications that meet security requirements across every product category.

Deep Instinct is continuing its strategic expansion into EMEA, contracting with T-Systems to utilize and distribute Deep Instinct's protection to its customers. Deep Instinct also signed strategic partnership agreements with Cyber Monks and Spinnakar to distribute Deep Instinct's deep learning-based solution across the region.