Security News
In an effort to grow its hybrid cloud and artificial intelligence capabilities, IBM announced on Tuesday that it was acquiring Polar Security, an Israel-based company specializing in data security posture management. A 2023 study by Gartner, looking at DSPM functions and capabilities, reported that DSPM solutions are getting savvier at uncovering data repositories and identifying their exposure risk, thanks to their ability to use data lineage to "Discover, identify and map data, across structured and unstructured data repositories, that relies on integrations with, for example, specific infrastructure, databases and CSPs.".
TRANServe - an electronic travel pass system managed by DoT, and used by many employees across the federal government to encourage use of public transport - told Congress it made a mistake in protecting that data.The DoT told The Register its CIO office "Isolated the breach to certain systems at the department used for administrative functions, such as employee transit benefits processing," adding that the incident did not affect any transportation safety systems.
TRANServe - an electronic travel pass system managed by DoT, and used by many employees across the federal government to encourage use of public transport - told Congress it made a mistake in protecting that data. The DoT told The Register its CIO office "Isolated the breach to certain systems at the department used for administrative functions, such as employee transit benefits processing," adding that the incident did not affect any transportation safety systems.
TechRepublic spoke with Ankur Shah, SVP and general manager of Prisma Cloud, about what cloud security means and how IT pros and decision makers should think beyond the traditional cybersecurity playbook when it comes to cloud security. Ankur Shah: Before the cloud, security was like a house with one front door, a camera and a security guard: one level of security and you're good to go.
Apple's App Store team prevented more than $2 billion in transactions tagged as potentially fraudulent and blocked almost 1.7 million app submissions for privacy, security, and content policy violations in 2022. The App Store team also protected Apple users from hundreds of thousands of unsafe apps last year, rejecting almost 400,000 apps for privacy violations such as trying to harvest the user's personal data without their consent or knowledge.
Although CISA doesn't provide specific password recommendations in the ransomware guidance, it recommends following the NIST password security guidelines. In one analysis it was discovered 83% of compromised passwords satisfy the password length and complexity requirements of regulatory password standards.
Google will add artificial intelligence to several online safety features and give users more insight into whether their information might have been posted on the dark web, the tech giant announced during the Google I/O conference on May 10. Google offers AI image generation and plans to roll out markups that will label those images as AI-generated in Search.
False alarm: despite a patch notes suggesting otherwise, that mysterious blob of microcode released for many Intel microprocessors last week was not a security update, the x86 giant says. In an email Monday, an Intel spokesperson told The Register that microcode-20230512, which popped up on the manufacturer's GitHub page "Does not contain any security updates and the note, , is meant to convey that there are no applicable security updates in the package."
Tech companies must take SaaS security seriously to prevent resources from leaking or being stolen. A strong SaaS posture is important for any company, but it is particularly important for organizations that store their proprietary code in SaaS applications.
SquareX is the first in building solutions keeping consumer security and productivity at the centre of all its core features for consumers to be fearless online! What is SquareX's vision for the future of internet security, and how does the company plan to achieve it?