Newsfeed Archive
News & Highlights
(Source: ISBuzz News) Endpoints are considered “trusted” if they meet certain security requirements or if the enterprise can control them in some way. Typically, they have an installed software agent that directs traffic
Read More
News & Highlights
(Source: Digital Trends) Want to make a quick $250,000? Who doesn’t, right? If you have the know-how to hunt down vulnerabilities in hardware and software, then that high-dollar reward could
Read More
News & Highlights
(Source: Threatpost) RCE vulnerabilities in Microsoft software have risen 58 percent since 2013, according to Avecto’s report. The remaining vulnerabilities were categorized–in order of their incidence–as information disclosure, elevation of privilege,
Read More
News & Highlights
(Source: Irish Times) It isn’t unusual to meet people with distinctive job titles working in the tech sector. But even so, proclaiming yourself to be a “security princess” carries a
Read More
News & Highlights
(Source: eWeek) Juniper Networks officials this week are expanding the company’s multi-cloud strategy with an array of hardware, software and services offerings that are designed to give businesses the throughput, automation
Read More
News & Highlights
(Source: ITWeb) “Our data centres have physical security but more and more we think about software security and we feel this is an area where we have some opportunities to be
Read More
News & Highlights
(Source: TNW) John Donne once said, “no man is an island.” If he lived in the 21st century, he might have said the same thing about software. Programs which, on
Read More
News & Highlights
(Source: Information Age) No matter how comprehensive individual pieces of security software are, as with any technology, they can’t be expected to run perfectly all the time. It’s important for businesses
Read More
News & Highlights
(Source: BGR) In recent months, Apple’s software development has been called into question like never before. Between a critical security bug in macOS, a brand-new product being launched late and without half of
Read More
News & Highlights
(Source: Help Net Security) AI projects will often involve software or systems from external service providers. It’s important that some insight into how decisions are reached is built into any service
Read More