Newsfeed Archive
News & Highlights
(Source: Security Boulevard) Ironically, Blackberry claims to be offering the “world’s most trusted mobile security software.” Security vendors, including Bitdefender, classify cryptocurrency miners as malware, and block them. Although Coinhive states that
Read More
News & Highlights
(Source: IoT Business News) IoT device manufacturers don’t have the excuse of not being aware that securitybreaches could be a problem. But nevertheless, many IoT device manufacturers still build devices
Read More
News & Highlights
(Source: ZDNet) Software security: In addition to the native security of Android provided by Google, Huawei’s EMUI provides application security, data security, and system security. Cloud security: Huawei relies on
Read More
News & Highlights
(Source: HuffPost UK) In September, the mega-breach of Equifax that exploited a known-vulnerability in a piece of web software resulted in the theft of 143 million American and 400 British customers.
Read More
News & Highlights
(Source: TIME) But first it has to pull out of a skid caused by a serious security flaw in its processor chips, which undergird many of the world’s smartphones and personal
Read More
News & Highlights
(Source: CSO Online) Now, in the past, few organizations considered managed security services for endpoint security. Why? Endpoint security translated to antivirus, so organizations purchased software from a leading vendor (i.e. Kaspersky, McAfee, Sophos, Symantec, Trend
Read More
News & Highlights
(Source: IndustryWeek) This complementary knowledge can help manufacturers assess vulnerabilities, qualify vendors, and work toward safer ongoing processes. For organizations unfamiliar with the management of software and the software supply chain, these efforts
Read More
News & Highlights
(Source: ABS-CBN News) Microsoft Corp said on Tuesday that software patches released to guard against microchip security threats slowed down some personal computers and servers, with systems running on older Intel Corp processors
Read More
News & Highlights
(Source: Forbes) In addition to this flood of fresh CIOs who have limited experience managing increasingly complex IT issues, we have CEOs and boards putting more pressure on IT
Read More
News & Highlights
(Source: Dark Reading) Defending against supply chain attacks will be tough because each software vendor has a different distribution mechanism and signing infrastructure, says Weston. In the past, companies could put software on
Read More