Please turn on your JavaScript for this page to function normally.
numbers
Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era

In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …

lock
Higher encryption adoption driven by rising data breach threats

Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …

lock
Organizations have seen an increase in device encryption

32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …

time
Security doesn’t always require immediacy

New security threats emerge almost continuously, meaning we now deal with a known unknown. In the past year alone, malware and ransomware use has sharply increased, 43% of …

shield
Research directions in cybersecurity to support a digital strategic autonomy

Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …

Pulse Secure
Critical infrastructure implications of the Pulse Secure multi-factor authentication bypass

The FireEye Mandiant team has discovered multiple threat actors exploiting a zero-day vulnerability in Pulse Secure VPN appliances. The attack infrastructure is very …

network
Using memory encryption in web applications to help reduce the risk of Spectre attacks

There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …

architecture
Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

server
Server market revenue reached $22.6 billion in 3Q20

Vendor revenue in the worldwide server market grew 2.2% year over year to $22.6 billion during the third quarter of 2020 (3Q20), according to IDC. Worldwide server shipments …

virtual reality
5 reasons IT should consider client virtualization

Virtualization has brought a dramatic level of growth and advancement to technology and business over the years. It transforms physical infrastructure into dedicated, …

Joerg Appenzeller computer chip
Engineers design transistor that disguises key computer chip hardware from hackers

A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …

D-Link DSR-1000AC router
D-Link routers vulnerable to remotely exploitable root command injection flaw

The Digital Defense Vulnerability Research Team uncovered a previously undisclosed vulnerability affecting D-Link VPN routers. D-Link DSR-150, DSR-250, DSR-500 and DSR-1000AC …

Don't miss

Cybersecurity news