Security News
Half a year into the shutdown, companies are still playing catch up to optimize their remote work experience, according to Infoblox. Organizations are still building out their IT infrastructure and security controls to optimize remote work.
The paper presents "SpiKey, a novel attack that utilizes a smartphone microphone to capture the sound of key insertion/withdrawal to infer the shape of the key, i.e., cut depths that form the 'secret' of the key, solely by the captured acoustic signal." The researchers explained that there will be more than one "Candidate keys" rather than a single one that fits the pattern, but that in the case of the particular six-pin key analysed, "SpiKey guarantees reducing more than 94 per cent of keys to less than 10 candidate keys" with three candidates being "The most frequent case".
"The Save-to-Thrive framework will be essential to success in the next normal as companies rely on technology and digital enablement - with a renewed emphasis on talent - to improve their plans for strategic cost transformation and overall enterprise performance improvement," said Omar Aguilar, principal and global strategic cost transformation leader, Deloitte Consulting. Revenue sources will be fundamentally different: According to the survey, the fastest growing revenue sources will be: digital channels; new products and services; and domestic operations.
For consumers who need to accelerate their productivity and protect their valuable content without compromising style, Western Digital introduced the new WD brand My Passport SSD in capacities up to 2TB. With a sleek, compact metal design and blazing fast speeds powered by NVMe technology, the new palm-sized drive allows home and business users to save, access and protect the content that matters. "The new My Passport SSD delivers the speed, reliability and functionality consumers have come to expect from us," said Susan Park, vice president, Consumer Solutions, Western Digital.
ISO has defined a standard approach for Certification Authorities to embed Legal Entity Identifiers within digital certificates. The move to simplify LEI integration paves the way for all digital certificates to be linked by a universal identifier to verified and regularly updated entity reference data, in a freely accessible repository, and also can contain the certificate owner's role within a legal entity.
Nutanix announced general availability of Nutanix Clusters on AWS, extending the flexibility and ease of use of the company's hyperconverged infrastructure software, along with all Nutanix products and services, to bare metal Amazon Elastic Compute Cloud instances on Amazon Web Services. With this announcement, Nutanix delivers hybrid cloud infrastructure - one that allows businesses to accelerate their digital initiatives and optimize spending, priorities further amplified in the age of COVID. Nutanix offers a single stack that integrates compute and storage, provides unified operations across private and public clouds, integrated networking with AWS, and license portability from private to public clouds, thus addressing key technical and operational challenges of the hybrid cloud era.
From a cybersecurity perspective, perhaps the greatest risk for digital education comes from the wide variation across districts in terms of resources. Data from Microsoft has shown that education as an industry accounted for 60% of reported malware encounters in June - affecting more than 5 million devices in just 30 days.
AppViewX announced its partnership with Google Cloud to support its newly announced Google Cloud Certificate Authority Service with AppViewX's Certificate Lifecycle Management and Automation product, CERT+. This integration enables businesses to simplify deployment of private CAs, enabling end-to-end automation of enterprise infrastructure, DevOps and IoT. Google Cloud and AppViewX's integration primarily focuses on securing the growing number of digital identities with a robust and future-proof PKI system, allowing users to communicate with DevOps tools and CI/CD toolchains.
Its underlying truth is undeniable: today's technology, particularly at a time of wholesale digital transformation, has expanded the threat surface exponentially, and it keeps expanding all the time, frequently exceeding the bandwidth of human operators to triage which threats are more critical. Research from the North Carolina State University found that leaks of digital secrets - passwords, cryptographic keys, API, and access credentials to more than 100,000 private code repositories - take place on development platforms such as GitHub thousands of times a day.
The challenge for cybersecurity teams is finding effective ways to deliver and maintain security at the speed of digital transformation, ensuring that every new technology, digital process, customer and partner interaction and innovation is protected. Modern security platforms help simplify data analytics by delivering capabilities that amplify threat detection, response and mitigation activities; deliver risk-management insights; and help organizations stay ahead of potential threats.