-
NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines
PRIVACY PRIVACY NanoLock has announced the launch of a new suite of zero-trust cybersecurity solutions for the industrial and manufacturing market. In a press release, the firm claimed to be the first to offer device-level protection solutions designed specifically for legacy and new industrial machinery and smart factory production lines. The launch comes in the…
-
Open-source standard aims to unify incompatible cloud identity systems
PRIVACY PRIVACY A new open-source project aims to unify incompatible cloud identity systems such as Azure, AWS and Google, giving users the ability to apply consistent identity and access policies across multi-cloud platforms. Announced by identity orchestration firm Strata Identity, the project consists of Hexa, an open-source technology, and IDQL, a new common policy format…
-
iPhone Malware that Operates Even When the Phone Is Turned Off
PRIVACY PRIVACY Researchers have demonstrated iPhone malware that works even when the phone is fully shut down. t turns out that the iPhone’s Bluetooth chip — which is key to making features like Find My work — has no mechanism for digitally signing or even encrypting the firmware it runs. Academics at Germany’s Technical University…
-
UK Government: Lack of Skills the Number One Issue in Cybersecurity
PRIVACY PRIVACY Andrew Elliot from DCMS provides an update on government initiatives to boost cybersecurity talent pipeline Read More
-
Building trust in a Zero-Trust security environment
PRIVACY PRIVACY This blog was written by an independent guest blogger. Despite years of industry efforts to combat insider threats, malicious behavior can still sometimes be difficult to identify. As organizations work towards building a corporate cyber security culture, many have begun looking into zero-trust architectures to cover as many attack surfaces as possible. This action is…
-
Digital Skimming is Now the Preserve of Non-Magecart Groups
PRIVACY PRIVACY Commodity kit invites new entrants into the market Read More
-
Western Allies Warn of Top Cyber-Attack Mistakes
PRIVACY PRIVACY Poor cyber-hygiene to blame for many compromises Read More
-
What Microsoft Defender can tell you about your network
PRIVACY PRIVACY Endpoint detection and response (EDR) is typically not something that smaller firms have. Defender for Business makes it easier to deploy EDR in a reasonable fashion and in an affordable package. At $3 per user per month, it takes the place of your traditional antivirus solution that you may have deployed in your…
-
Top Linux endpoint protection software
PRIVACY PRIVACY I’ve been running the Linux desktop since the great desktop debate was between C Shell and Bash. I’ve never felt a need for a Linux antivirus program. But, that’s not to say that I thought I could get away without Linux desktop or server security. Far from it! While I use third-party programs…
-
Police Warn of £15m Courier Scams
PRIVACY PRIVACY Blend of phone and face-to-face fraud targets vulnerable Read More