Array
(
[last_tab] => 1
[mts_logo] => https://techsecuritydaily.com/wp-content/uploads/2016/11/tsd-logo-1.png
[mts_footer_logo] =>
[mts_favicon] =>
[mts_header_code] =>
[mts_copyrights] => Theme by MyThemeShop.
[mts_trending_articles] => 1
[mts_trending_articles_cat] => 18
[mts_featured_slider] => 1
[mts_featured_slider_cat] => Array
(
[0] => 16
)
[mts_featured_carousel] => 1
[mts_featured_carousel_cat] => 16
[mts_pagenavigation] => 1
[mts_color_scheme] => #38b7ee
[mts_layout] => cslayout
[mts_full_posts] => 0
[mts_bg_color] => #e7e5e6
[mts_bg_pattern_upload] =>
[mts_custom_css] =>
[mts_responsive] => 1
[mts_tags] => 0
[mts_related_posts] => 1
[mts_author_box] => 0
[mts_header_adcode] =>
[mts_posttopleft_adcode] => Submit original article and get paid. Find out More
[mts_posttop_adcode] =>
[mts_posttop_adcode_time] => 0
[mts_postend_adcode] =>
[mts_postend_adcode_time] => 0
)
Latest
News & Highlights
(Source: The INQUIRER) THE SOCIAL NETWORK Facebook has been accused of spamming users of its two-factor authentication (2FA) service. Facebook implemented 2FA a few months ago, but it appears
Read More
News & Highlights
(Source: Electronic Design) One of the thorniest questions facing firms building Internet of Things devices is how to balance security with cost and battery life. The computer chips embedded in traffic
Read More
News & Highlights
(Source: ISBuzz News) Endpoints are considered “trusted” if they meet certain security requirements or if the enterprise can control them in some way. Typically, they have an installed software agent that directs traffic
Read More
News & Highlights
(Source: Digital Trends) Want to make a quick $250,000? Who doesn’t, right? If you have the know-how to hunt down vulnerabilities in hardware and software, then that high-dollar reward could
Read More
News & Highlights
(Source: Threatpost) RCE vulnerabilities in Microsoft software have risen 58 percent since 2013, according to Avecto’s report. The remaining vulnerabilities were categorized–in order of their incidence–as information disclosure, elevation of privilege,
Read More
News & Highlights
(Source: Irish Times) It isn’t unusual to meet people with distinctive job titles working in the tech sector. But even so, proclaiming yourself to be a “security princess” carries a
Read More
News & Highlights
(Source: eWeek) Juniper Networks officials this week are expanding the company’s multi-cloud strategy with an array of hardware, software and services offerings that are designed to give businesses the throughput, automation
Read More
News & Highlights
(Source: ITWeb) “Our data centres have physical security but more and more we think about software security and we feel this is an area where we have some opportunities to be
Read More
News & Highlights
(Source: TNW) John Donne once said, “no man is an island.” If he lived in the 21st century, he might have said the same thing about software. Programs which, on
Read More
News & Highlights
(Source: Information Age) No matter how comprehensive individual pieces of security software are, as with any technology, they can’t be expected to run perfectly all the time. It’s important for businesses
Read More