Security News & Reviews - Page 4
More Security News
The new cloud region expands availability for the U.S. Intelligence Community by providing access for secret-level clearance usage.
DAILY VIDEO: Data shows China likely delaying vulnerability reports to help attacks; Workday HCM will modernize HR portals with a smarter employee experience; Google announces an enterprise version of its Dialogflow chatbot API; and there's more.
Security researchers discover flaws in Intel's Management Engine that could enable attackers to run unsigned code.
Survey is based on a comprehensive online survey of 472 cybersecurity professionals, which provides deep insight into current security trends.
As the holiday shopping season gets underway, many consumers will pick up new internet of things devices, even though many of those devices might represent security risks.
McAfee discovers new mobile malware that is linked to the same group that was behind the attack on Sony Pictures and the recent WannaCry ransomware worm.
NEWS ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can keep them from getting the data they want.
DAILY VIDEO: States starting to implement audits to bolster election integrity; North Korea getting ready wage a global cyber war, Experts Say; Google Job Search results now include salary data or estimates; and there's more.
While China’s national vulnerability database publishes details of security issues faster than its U.S. counterpart, the cases where it is slower suggest that authorities are delaying publication of vulnerabilities useful for exploiting adversaries’ systems, an analysis finds.
VIDEO: Nadir Izrael, co-founder and CTO of Armis Security discusses the expanding impact of the BlueBorne bluetooth security vulnerability that his firm discovered.
The need for continued evolution of cyber-security technologies and approaches was a key theme at the 11th edition of the SecTor security conference in Toronto.
New PeopleSoft JoltandBleed vulnerabilities could enable an attacker to leak information and gain control of an unpatched system.