News

  • NanoLock’s zero-trust cybersecurity suite to protect industrial machinery, production lines

    PRIVACY PRIVACY NanoLock has announced the launch of a new suite of zero-trust cybersecurity solutions for the industrial and manufacturing market. In a press release, the firm claimed to be the first to offer device-level protection solutions designed specifically for legacy and new industrial machinery and smart factory production lines. The launch comes in the…

    Read More

  • Open-source standard aims to unify incompatible cloud identity systems

    PRIVACY PRIVACY A new open-source project aims to unify incompatible cloud identity systems such as Azure, AWS and Google, giving users the ability to apply consistent identity and access policies across multi-cloud platforms. Announced by identity orchestration firm Strata Identity, the project consists of Hexa, an open-source technology, and IDQL, a new common policy format…

    Read More

  • iPhone Malware that Operates Even When the Phone Is Turned Off

    PRIVACY PRIVACY Researchers have demonstrated iPhone malware that works even when the phone is fully shut down. t turns out that the iPhone’s Bluetooth chip­ — which is key to making features like Find My work­ — has no mechanism for digitally signing or even encrypting the firmware it runs. Academics at Germany’s Technical University…

    Read More

  • UK Government: Lack of Skills the Number One Issue in Cybersecurity

    PRIVACY PRIVACY Andrew Elliot from DCMS provides an update on government initiatives to boost cybersecurity talent pipeline Read More

    Read More

  • Building trust in a Zero-Trust security environment

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Despite years of industry efforts to combat insider threats, malicious behavior can still sometimes be difficult to identify. As organizations work towards building a corporate cyber security culture, many have begun looking into zero-trust architectures to cover as many attack surfaces as possible. This action is…

    Read More

  • Digital Skimming is Now the Preserve of Non-Magecart Groups

    PRIVACY PRIVACY Commodity kit invites new entrants into the market Read More

    Read More

  • Western Allies Warn of Top Cyber-Attack Mistakes

    PRIVACY PRIVACY Poor cyber-hygiene to blame for many compromises Read More

    Read More

  • What Microsoft Defender can tell you about your network

    PRIVACY PRIVACY Endpoint detection and response (EDR) is typically not something that smaller firms have. Defender for Business makes it easier to deploy EDR in a reasonable fashion and in an affordable package. At $3 per user per month, it takes the place of your traditional antivirus solution that you may have deployed in your…

    Read More

  • Top Linux endpoint protection software

    PRIVACY PRIVACY I’ve been running the Linux desktop since the great desktop debate was between C Shell and Bash. I’ve never felt a need for a Linux antivirus program. But, that’s not to say that I thought I could get away without Linux desktop or server security. Far from it! While I use third-party programs…

    Read More

  • Police Warn of £15m Courier Scams

    PRIVACY PRIVACY Blend of phone and face-to-face fraud targets vulnerable Read More

    Read More

News, Advisories and much more

Exit mobile version