Security News
In an effort to support this cybersecurity strategy, ENISA releases a report intended to look into digital strategic autonomy in the EU and suggests future research directions. Digital strategic autonomy can be defined as the ability of Europe to source products and services designed to meet the EU's specific needs and values, while avoiding being subject to the influence of the outside world.
TrustGrid announced a new use case for its platform to provide citizens with a secure digital vaccine passport that can be stored on their smartphone. Designed using distributed ledger technology, TrustGrid is an opt-in system where citizens can authenticate their identity and vaccination status and receive a QR code to show as proof of vaccination.
Increased investments in cybersecurity, information security and consumer privacy are the top priorities of business leader respondents to demonstrate a commitment to building digital trust, according to a newly released report. PwC's latest Cyber Trust report also found that business leaders identified cloud security and data protection and privacy as the most strategic areas to prioritize in improving stakeholder trust.
CCC Digital Key Release 3.0 enables consumers to use their mobile device as a digital key hands-free
The Car Connectivity Consortium announced that its Digital Key Release 3.0 specification - which adds Bluetooth Low Energy and Ultra Wideband wireless connectivity technologies to enable compatible mobile devices with passive keyless access and engine start - is planned for completion by the middle of 2021. "We are creating a world where our mobile devices become true digital keys for our vehicles, bringing a new level of convenience and accessibility for users," said Daniel Knobloch, president, CCC. "Our Digital Key Release 3.0 will allow users to leave their mobile device in their bag or pocket when unlocking or starting their vehicle."
IBM is working with partners on its Digital Health Pass, which allows for easy sharing of health credentials such as a COVID-19 vaccine or test. IBM's GM Jason Kelley shares details.
Ai released a report detailing the findings of a survey of over 600 enterprise IT, security, and business decision makers on the state of digital transformation in their business and ROI during the COVID-19 pandemic. Digital transformation ROI. Survey respondents overwhelmingly agreed that visibility into planning processes and the alignment of software development and delivery processes to business objectives are critical to driving better business outcomes.
Mastercard on Monday announced that it's acquiring digital identity verification company Ekata for $850 million. The acquisition of Seattle-based Ekata is part of Mastercard's plan to boost its identity verification capabilities.
HID Global announced the general availability WorkforceID Authentication, the latest addition to its cloud platform for creating a seamless, effortless experience for issuing, managing and using identity credentials in physical and digital workplaces. "A person's identity has become the new security perimeter in a hybrid workplace that now extends from home to the office and everywhere in between," said Julian Lovelock, VP Global Business Segment, IAM, with HID Global.
An unfortunate byproduct of the employee turnover is the cybersecurity threat that comes with having a significant number of former employees. "A lot of companies fail to have clear policies or a checklist that employers use for post-employee separation. This is extremely important because failing to do so is going to involve a lot of things but the most important thing is that you want to make sure that the former employee or even a subcontractor that previously had access to the organization's technologies and systems is completely locked out," Guccione said in an interview.
While developing a seamless and successful digital mindset with a security strategy is not a simple task, the effort is crucial for the health of a company. To help development teams write more secure code, companies must take measure of developers' existing security knowledge and workflows, as well as understand how security impacts their end users.