Security News > 2021 > December

Cybersecurity: Go from novice to expert with this course bundle
2021-12-17 11:00

The 2022 Masters in Cyber Security Certification Bundle has everything a total beginner needs, not only the skills but also how to pass certification exams and ace job interviews. The "Complete Ethical Hacking & Cyber Security Masterclass Course" is a comprehensive guide to all of the latest techniques of penetration testing and ethical hacking.

This image looks very different on Apple devices — see for yourself
2021-12-17 07:56

Take a good look at the image below and the device you are on. If you are using an Apple device and viewing this page on Safari, chances are the image appears quite differently from what you'd see on, for example, Chrome or an imaging app on Windows.

New infosec products of the week: December 17, 2021
2021-12-17 07:00

AwareGO Human Risk Assessment for Enterprise measures employees' cybersecurity behavior. Pondurance Cyber Risk Assessments analyze and visualize potential cybersecurity gaps.

Want to assemble a cyber Dream Team? Look back at the ‘92 Olympics
2021-12-17 06:00

Think back to 1992, when the USA "Dream Team", critically acclaimed as the greatest basketball team of all-time, secured the gold medal at the Summer Olympic Games in Barcelona. To assemble a Dream Team of cyber professionals who can protect enterprises from modern threats, organizational leaders must prioritize the right balance of collaborative minds, complementary specializations, diverse perspectives and - most importantly - a consistent willingness to work in unison.

Digital IDs don’t have to impinge on civil liberties and privacy
2021-12-17 05:30

Between the need for secure access to digital services and the demand for increased security, the case for a trusted and verifiable ID system has never been stronger. One question remains: Who gets to implement this system? If the answer is a company or a government, then concerns around personal privacy and civil liberties become quite relevant.

Immudb: Open-source database, built on a zero trust model
2021-12-17 05:00

Now, with full transactional support for everyday business applications, the open source immudb tamper-proof database can serve as the main transactional database for enterprises. "There is no need to have immudb running next to a traditional database anymore, as immudb now has full ACID transactional integrity compliance," said Jerónimo Irázabal, co-founder of immudb and lead architect at Codenotary.

Why is a well thought-out approach to cloud migration imperative?
2021-12-17 04:30

With 80% of organizations now using a mix of cloud and on-premises database environments, the survey shows that the focus of data professionals is shifting to addressing the difficulties of migrating to the cloud ahead of improving the performance of their database estates. There is not one cloud there are many, with the 2021 State of the Cloud Report from Flexera revealing that organizations now use an average of 2.6 public clouds and are experimenting with an additional 1.1.

European UCaaS market to gain momentum in 2022
2021-12-17 04:00

A ResearchAndMarkets study provides an in-depth analysis of trends, growth factors and growth opportunities in the European UCaaS market. International providers will enter the European markets and European providers will seek to expand internationally, creating new levels of competition.

Over Log4j? VMware has another critical flaw for you to patch
2021-12-17 02:28

VMware customers have probably had a busy week because more than 100 of the IT giant's products are impacted by the Log4j bug. Now they need to make another urgent patching effort, because the virty giant has identified another critical flaw in its products that it rates as requiring urgent attention.

Facebook locks out 1,500 fake accounts used by cyber-spy firms to snoop on people, alerts 50k potential targets
2021-12-17 01:41

Facebook successor Meta on Thursday said it canceled 1,500 social media accounts used by seven surveillance-for-hire firms to conduct online attacks against government critics and members of civil society. These accounts were primarily used to observe targets and lure them into visiting malicious websites, or receiving booby-trapped messages, typically, that compromise their devices and online profiles.