Security News
Entrust announced that it has partnered with Sysmosoft to provide a comprehensive solution for digital signature management. Under the agreement, the Sysmosoft document signing workflow is available as an add-on to Entrust digital signing solutions.
When Google Chrome 90 arrives in April, visitors to websites that depend on TLS server authentication certificates from AC Camerfirma SA, a digital certificate authority based in Madrid, Spain, will find that those sites no longer present the secure lock icon. Mozilla, maker of Chrome rival Firefox, has been trying to decide whether Camerfirma's history of questionable certificate management practices - documented in a lengthy list - warrants banishing the Spanish company's certificates from its Root Store - the set of certificates Firefox recognizes as trustworthy by default.
Asset and wealth management companies play an important role in handling finances and investments for different clients throughout the world. A report released Thursday by digital risk company Digital Shadows examines why and how AWM companies are vulnerable to cyberattack and how they can defend themselves.
So how do we solve this problem? It begins with a better vulnerability management system, a refocused commitment to cloud application security best practices and a realignment of our current security posture with the specific requirements of the cloud. Vulnerability assessments are conducted periodically to evaluate the existing security posture and help inform any necessary changes to the vulnerability management action plan.
Find out what your company could risk by not getting cybersecurity audits. Steven Wertheim, president of SonMax Consultants, in his CPA Journal article Auditing for Cybersecurity Risk makes a strong case that auditing should be a part of every cybersecurity defense program.
Risk management is more than recovery from a cyberattack. Another equally important function of risk management is that it can be considered a proactive methodology used to identify risks in an organization's cybersecurity framework.
An employee at emergency roadside rescue biz RAC has received an eight-month suspended prison sentence for unsanctioned access to computer systems that saw her sell customers' data to an accident claims management company. Kim Doyle pleaded guilty to charges of conspiracy to secure unauthorised access to computer data and cashing in on RAC punters' personal information that she passed to William Shaw, director of TMS, trading as LIS Claims.
Iridium announced commercial availability of the Iridium Edge Solar - a secure, maintenance-free, solar-powered remote asset tracking and management device. With over-the-air configuration capabilities, the Iridium Edge Solar is ideal for Vessel Monitoring Systems, fisheries management, tracking of freight shipping containers, Supervisory Control and Data Acquisition applications, monitoring of oil and gas pipelines and heavy equipment telematics data reporting.
ePlus announced that it has acquired the business of System Management and Planning, a provider of technology solutions and services in upstate New York and the Northeast. The acquisition enhances ePlus' footprint across the region, broadens its technology solution offerings especially in the areas of collaboration and supporting virtual employees, and adds to ePlus' set of commercial, enterprise and state, local, and education customers.
Enterprises will take baby steps towards left-shifting their vulnerability remediation programs. As we move into 2021, the good news is we'll learn a lot about left shifting vulnerability remediation programs.