News & Highlights Archive
News & Highlights
(Source: CSO Online) New security automation solutions can apply this approach to threat hunting, ranking events by order of severity, raising alerts to any suspicious events that the softwarehas deemed suspicious or
Read More
News & Highlights
(Source: Information Age) Ransomware is moving on – to attack organisations’ back-ups. The problem is that there is too much focus on anti-virus software, and so people are being reactive
Read More
News & Highlights
(Source: Information Age) Attackers continue to target these devices due to their weak or non-existent security, both in development and deployment. … In WatchGuard’s Q1 2017 Internet SecurityReport, Linux malware represented
Read More
News & Highlights
(Source: IT PRO) From a security point of view, HP has updated Sure Start, offering enhanced encryption and event logging and Sure Run, which monitors the key processes of the device
Read More
News & Highlights
(Source: CRN) Cisco Systems says the initial fix for a recently disclosed software securityvulnerability was incomplete, and attackers have more ways to exploit the bug than originally thought. “After further
Read More
News & Highlights
(Source: TechCrunch) Old source code from three years ago appears to have been leaked,” the company said in a statement provided to TechCrunch, “but by design the security of our products
Read More
News & Highlights
(Source: TechRadar) A smartphone app can also be very useful in terms of accessing and monitoring funds – but equally, poorly implemented software can represent a security risk. Finally, look for an exchange
Read More
News & Highlights
(Source: PR Newswire) With up to 32 cores (64 threads), 8 memory channels and 128 PCIe lanes, AMD’s EPYCTM processors offer flexibility, performance, and security features for today’s software defined ecosystem. “We are pleased
Read More
News & Highlights
(Source: TechRadar) A smartphone app can also be very useful in terms of accessing and monitoring funds – but equally, poorly implemented software can represent a security risk. Finally, look for an exchange
Read More
News & Highlights
(Source: We Live Security) Once you determine that devices are safe, you should bolster your overall securityprecautions. Make sure you have updated security software including anti-malware and firewall functionality. Update your software including your
Read More