News & Highlights Archive
News & Highlights
(Source: TechTarget) Previously, encryption with vSphere required third-party hardware or software and didn’t achieve the same level of granularity. This feature takes a data-in-motion approach and encrypts I/O as it comes
Read More
News & Highlights
(Source: TechTarget) Bloggers delve into CISO information security objectives, Juniper’s new product release and how self-sufficient networking teams should try to be in an area of … To stay relevant, vendors
Read More
News & Highlights
(Source: Digital Trends) Facial recognition systems can enhance security — but many of them can’t adjust for a pair of sunglasses or a surgical mask. Panasonic’s new facial recognition software algorithms, however, can
Read More
News & Highlights
(Source: Naked Security) It’s one thing to launch cryptocurrency businesses with programming weaknesses that lead to them getting hacked and hoovered. But lying to the Securities Exchange Commission (SEC)
Read More
News & Highlights
(Source: Computerworld) For the first time ever, Google has established a baseline for what constitutes an Android smartphone that’s ready for use by enterprises. “Some of the top concerns
Read More
News & Highlights
(Source: http://totalsecuritydailyadvisor.blr.com/) Cybersecurity risks affect every business, no matter how large or small. This visual guide from transcosmos Information Systems delves into 11 cybersecurity risks that every business must
Read More
News & Highlights
(Source: InfoQ.com) Serverless offers an opinionated way of operating software, expressing these opinions through various constraints. One key constraint, arguably the most important one, is that your functions have to
Read More
News & Highlights
(Source: Gigaom) First off, one of the simplest things you can do to protect your data is to install top-quality security software on all the devices you use. There are many
Read More
News & Highlights
(Source: CSO Online) They must be hypervigilant about implementing security measures used for other precious data, such as regularly switching up passwords and using multi-factor authentication for email to protect cryptocurrency
Read More
News & Highlights
(Source: Digital Journal) With the new tranche of research, this considered the twenty most popular applications on the Internet. The research involved analyzing the security problems and communicating these to the software developers.
Read More