Security News > 2020

Debunking vulnerability management myths for a safer enterprise
2020-03-30 05:00

Let's look at and debunk the top vulnerability management myths, so that enterprises may opt to change their practices in ways that make fortifying cyber defenses and reducing risks significantly easier. New vulnerability management solutions make scanning at scale significantly faster and easier without impacting network performance, so there is really no good reason why enterprises should put networks at risk unnecessarily.

Why we need to secure IoT connections sooner than later
2020-03-30 04:30

In this podcast, Mike Nelson, Vice President of IoT Security at DigiCert, talks about the growing insecurity of IoT devices and what we should do about it. We read a lot about bad password practices, and hard-coded credentials, and hackers being able to gain access because they go in and they are able to discover the password and the user manuals of IoT - IoT instruction manuals.

Seven key cybersecurity trends for 2020 by world-leading professionals
2020-03-30 04:00

As the number of smart devices in private households increase, so do the opportunities for cybercriminals to attack, according to TÜV Rheinland. Experts view these key cybersecurity trends as critical to understand in 2020.

Organizations not properly set up to manage risk, coronavirus pandemic reveals
2020-03-30 03:30

The COVID-19 pandemic is just the latest in a line of recent risk events showing how organizations are not properly set up to manage risk, especially fast-moving ones. "Traditional approaches fail because they can't effectively deal with fast-moving and interconnected risks. Pandemic is a rapidly developing type of risk that needs a dynamic risk management set-up," said Malcolm Murray, vice president and fellow, research for the Gartner Audit and Risk practice.

Whitepaper: Cloud security risks and how to mitigate them
2020-03-30 03:00

So how do we explain the ever-increasing number of data breaches? According to Cloud Security Risks & How to Mitigate Them.Insufficient access management and account hijacking.

Noble.AI completes contributions to TensorFlow, Google’s open-source framework for deep learning
2020-03-30 00:30

AI, whose artificial intelligence software is purpose-built for engineers, scientists, and researchers and enables them to innovate and make discoveries faster, announced that it had completed contributions to TensorFlow, the world's most popular open-source framework for deep learning created by Google. "Part of Noble's mission is building AI that's accessible to engineers, scientists and researchers, anytime and anywhere, without needing to learn or re-skill into computer science or AI theory," said Dr. Matthew C. Levy, Founder and CEO of Noble.

Keysight and NVIDIA boost development of flexible virtualized networks and high-value mobile services
2020-03-30 00:00

Keysight Technologies, a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced it is accelerating the development of flexible virtualized networks and high-value mobile services with NVIDIA. Mobile operators are in the process of transforming their networks, using a dynamic virtualized radio access network architecture and open RAN standard interfaces, to cost-effectively and flexibly deliver a broad range of services that rely on low latencies and high throughput. Keysight offers solutions that enable mobile operators and network equipment manufacturers to validate 5G and legacy radio access networks as well as core networks that are critical to ensuring the end-user experience of applications using vRAN architecture.

Google Skips Chrome 82, Resumes Stable Releases
2020-03-29 16:14

Google is on track to resume the roll-out of stable Chrome releases next week, but says it will skip one version of the browser.

Privacy Rights May Become Next Victim of Killer Pandemic
2020-03-29 14:16

Digital surveillance and smartphone technology may prove helpful in containing the coronavirus pandemic - but some activists fear this could mean lasting harm to privacy and digital rights. These moves have prompted soul-searching by privacy activists who acknowledge the need for technology to save lives while fretting over the potential for abuse.

Hackers Exploit Zero-Day Bugs in Draytek Devices to Target Enterprise Networks
2020-03-29 11:22

Cybersecurity researchers with Qihoo 360's NetLab today unveiled details of two recently spotted zero-day cyberattack campaigns in the wild targeting enterprise-grade networking devices manufactured by Taiwan-based DrayTek. According to the report, at least two separate groups of hackers exploited two critical remote command injection vulnerabilities affecting DrayTek Vigor enterprise switches, load-balancers, routers and VPN gateway devices to eavesdrop on network traffic and install backdoors.