Security News > 2020
The first examples of deepfakes seen by the general public were mainly amateur videos created using free deepfake tools, typically of celebrities' faces superimposed into pornographic videos. This October, Governor Gavin Newsom signed California's AB 730, known as the "Anti-Deepfake Bill," into law with the intent to quell the spread of malicious deepfakes before the 2020 election.
What is DevSecOps? Simply put, it is the merging of DevOps and security processes to ensure code is secure from development through to testing and deployment. "To help enterprises tighten their security, the US Defense Department defined it in detail last August [PDF] as a"an organizational software engineering culture and practice that aims at unifying software development, security and operations.
In an era of technological transformation and cyber everywhere, the attack surface is exponentially growing as cyber criminals attack operational systems and backup capabilities simultaneously in highly sophisticated ways leading to enterprise-wide destructive cyberattacks, a Deloitte survey reveals. A truly viable cyber resilience program can benefit an organization's ability to recover, respond and be ready for a destructive cyberattack, where over a quarter of respondents believe a comprehensive approach to cyber resilience would most improve their organizations' approach address these potential extinction-level events.
In a OnePoll online survey of 2,000 people aged 18 and above, 4 out of 5 Americans agreed there should be a law to protect their personal data, and 83 percent of people expect to have control over how their data is used at a business. "However, we still have a lot of education to do. It's clear people want the regulations. Our research shows that 50% of people would exercise at least one right under the CCPA.".
Cisco introduced an IoT security architecture that provides enhanced visibility across both IT and OT environments, and protects industrial processes. Cisco is delivering comprehensive security by converging the IT and OT within security operations centers to provide advanced anomaly detection with built-in threat intelligence.
Semtech, a leading supplier of analog and mixed-signal semiconductors and advanced algorithms, announced the launch of LoRa Smart Home, a device designed for LPWAN based smart home, community and consumer applications. "With its simple and flexible network architecture, Semtech's new LoRa® Smart Home device offers a unique opportunity to accelerate the consumer adoption of smart home connected solutions."
Magnet Forensics released Magnet AXIOM Cyber, an innovative new solution purpose-built for organizations that need to perform remote acquisitions as well as collect and analyze evidence from cloud sources, computers and mobile devices. In addition to all the innovative features found in Magnet AXIOM, Magnet Forensics' best-in-class digital forensics solution, AXIOM Cyber enables investigators to remotely collect evidence from target endpoints.
Kindite, a Tel-Aviv based cybersecurity company that creates Zero-Trust Environments to protect data in the cloud, has launched a beta version allowing IT and security teams to have a new level of control over their cloud environment. Kindite allows encryption keys to be kept on-prem or in a trusted environment while allowing the processing of encrypted data in the cloud.
Cisco announced three developments that will help bring about this radical change-an AI infusion, a new customer experience solution, and a new cloud contact center product. Together, they fundamentally transform the customer experience with contact centers, for the better.
F5 Networks introduced NGINX Controller 3.0, a cloud-native application delivery solution to help organizations increase business agility, mitigate risk, and enhance their customers' digital experiences. NGINX Controller combines a broad set of app services, including load balancing, API management, analytics, and service mesh with an application-centric approach.