News

Social engineering  >  Laptop user with horns manipulates many social media accounts

Virtual security conferences fill void left by canceled face-to-face events

Notable members of the infosec community are creating impromptu but highly popular virtual events using cheap, off-the-shelf tools.

Statue of Lliberty as a digital framework / New York / binary code

New York's SHIELD Act could change companies’ security practices nationwide

SHIELD Act provisions broaden the scope of consumer privacy and place requirement on protecting personal data for organizations that collect information on New York residents.

hybrid cloud

Private cloud reimagined as equal partner in multi-cloud world

A new generation of private cloud options, including Amazon Outposts, Microsoft Azure Stack and Google Anthos, is leading enterprises to rethink hybrid cloud strategies.

A stressed employee works alone in a dimly lit office.

Coronavirus challenges capacity, but core networks are holding up

As the new coronavirus continues its infestation and more people work from home, the impact of the increased traffic on networks in the US so far seems to be minimal.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

Cisco warns of five SD-WAN security weaknesses

Cisco has issued five – three on the high-end of the vulnerability scale – warnings about security weaknesses in its SD-WAN offerings.

wireless communication network in big city concept iot ict picture id1026969404

Cisco moves WiFi roaming technology to wireless broadband consortium

Cisco has transferred he development and promotion of its OpenRoaming technology – which lets users move seamlessly between wireless and cellular networks such as LTE without interruption—to the Wireless Broadband Alliance.

businessman on a rock in a stormy ocean

Coronavirus challenges remote networking

COVID-19 sends IBM, Google, Amazon, AT&T, Cisco, Apple and others scrambling to securely support an enormous rise in teleworkers, and puts stress on remote-access networks.

coronavirus lab research analytics by da kuk getty

COVID-19 best practices for data-center operators

Uptime Institute has created a COVID-19 response guide based on tips and recommendations from its network of data center operators and partners.

Overflow  >  Pouring more binary water into a glass than it can hold causing overflow.

Electronics should sweat to cool down, say researchers

Scientists think that in much the same way the human body releases perspiration to cool down, special materials might release water to draw heat from electronics.

United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy

The intergovernmental commission outlines the steps needed to defend the United States from modern cybersecurity threats.

woman in profile thinking innovation smart city iot ai city scape skyline

Report: Shadow IoT is prevalent, insecure

Zscaler data shows huge amounts of unencrypted IoT traffic moving in and out of enterprise networks.

Mozilla Firefox headquarters

What's in the latest Firefox upgrade? Firefox 74 ends add-on sideloading

Focusing on security and privacy, version 74 is the first to arrive in the browser’s new four-week release cadence.

gears / build management + automation / circuits

Atlassian adds no-code automation to Jira Cloud products

New workflow automation capabilities are a result of Atlassian’s acquisition of Code Barrel last year.

cyclical update arrows on a background of orange progress bars

Data confirms: Given control, users opt for just one Windows 10 upgrade per year

Windows 10 users rejected Microsoft's longtime contention that operating systems should be updated on an aggressive tempo.

promoting an idea / raising awareness / lightbulb / technology / gear

OpenSilver resurrects Silverlight with WebAssembly

Open source OpenSilver project revives Microsoft’s rich Internet technology using Mono for WebAssembly and Blazor

CSO  >  ransomware / security threat

Deloitte: 8 things municipal governments can do about ransomware

Deloitte researchers explain why state and local governments are favored for ransomware attacks and how they can protect themselves with limited resources.

ai artificial intelligence ml machine learning vector

ServiceNow: Not just for managing IT services anymore

ServiceNow is making a play to push beyond ITSM, thanks to new AI tools in the Orlando release of its Now platform and other recent AI-related moves.

interoperable gears / integrated tools / interoperability

Open-source options offer increased SOC tool interoperability

Too many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability.

5G mobile wireless network

Enterprises roll out private 5G while standards, devices, coverage evolve

Early adopters are beginning to test private 5G deployments, inspired by the promise of superior performance and support for previously infeasible applications.

Intel CPU  >  security

New CPU attack technique can leak secrets from Intel SGX enclaves

The Load Value Injection attack can bypass security boundaries and mitigations put in place for other CPU vulnerabilities such as Spectre and Meltdown.

Load More