AWS has expanded its portfolio with three new services and capabilities meant to help organizations build and operate securely in the cloud. [Read More]
A university student in California has filed a class-action lawsuit against video app TikTok, which she accuses of harvesting large amounts of user data and storing it in China. [Read More]
Google says 80% of Android apps encrypt traffic by default and the percentage is even higher in the case of applications designed for the latest versions of the operating system. [Read More]
HelpSystems has acquired ClearSwift, a Switzerland-based firm that provides deep content inspection and adaptive filtering for documents within the network and at entry and exit points. [Read More]
The European Commission said Monday it had begun a "preliminary investigation" into how Facebook and Google collect personal data and what they do with it. [Read More]
Twitter and Facebook this week took action against malicious mobile software development kits (SDKs) that were used to improperly access user data. [Read More]
Twitter users no longer need a phone number to use 2-Factor Authentication (2FA) to secure their accounts, and can now use codes via text messages , mobile security apps, and security keys. [Read More]
To build and maintain a secure cyber presence, the best defense is to start with a security-driven development and networking strategy that builds a hardened digital presence from the ground up.
Securing multi-cloud and hybrid environments creates an unfamiliar situation for many organizations, in which they’re unsure of who is responsible for controlling access to and securing the underlying infrastructure.
Cybersecurity teams need actionable insight into the latest techniques, tactics and procedures being used by attackers and a continuous understanding of their environment and anomalous behavior.
Having a platform that serves as a central repository allows you to aggregate internal threat and event data with external threat feeds and normalize that data so that it is in a usable format.
The best way to stay ahead of threats while enabling business agility to keep up with the latest technology advances is to look to the network as the first line of defense.
The arrival of 5G will fuel an explosion of never-before-seen IoT machines, introducing uncharted vulnerabilities and opening the door for cyber-criminals to compromise our increasingly intertwined cities.
Because attackers will exploit the paths of least resistance and move laterally through the enterprise, visibility must include all managed and unmanaged assets (enterprise IoT, shadow IoT, legacy systems, etc.)
Security-Driven Networking is a new, strategic approach to security that enables the seamless expansion of network environments and services without ever compromising on security.