Please turn on your JavaScript for this page to function normally.
person
Why a single online name and social cards will be the new norm

Each day, online users provide companies, organizations, and other individuals with vital personal information without much thought. As social networks and brands began to use …

password
Home workplaces introduce new risks, poor password hygiene

Entrust Datacard released the findings of its survey, which highlights the critical need to address data security challenges for employees working from home as a result of the …

Google Security
Google unveils secure remote access service to unburden enterprise VPNs

Google has made available BeyondCorp Remote Access, a cloud-based, zero trust service that allows employees, contractors and partners to securely access specific corporate …

see
With a transition to remote work, network visibility becomes more critical than ever

More than 64 percent of organizations suffered at least one successful attack within the last year, and 59 percent believe lack of network visibility poses a high or very high …

BYOK
Multi-cloud key management and BYOK

Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …

chip
Starbleed vulnerability: Attackers can gain control over FPGAs

Field Programmable Gate Arrays, FPGAs for short, are flexibly programmable computer chips that are considered very secure components in many applications. Starbleed …

network
Researchers develop self-healing and self-concealing PUF for hardware security

A team of researchers from the National University of Singapore (NUS) has developed a novel technique that allows Physically Unclonable Functions (PUFs) to produce more …

PKI
10 considerations in order to ensure business continuity for PKI

Every year, enterprises face unforeseen events that can disrupt operations. These events are rarely predictable and often create significant challenges for IT and security …

vault
Encryption is finally being used primarily to protect personal data rather than just for compliance

As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal …

lock
TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys

For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots takes you back to the first version of the Secure Sockets …

vault
Businesses can avoid fines if customer data is encrypted or redacted

Encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA, according to ESG and Fortanix. What can you do? The …

lock
Personal data protection today: We should demand more

The growing number of cybersecurity incidents reported each year – and the fact that many attacks remain unreported for security and PR reasons – can leave even …

Don't miss

Cybersecurity news