Security News & Reviews

More Security News

Armis CEO

Armis CTO Details Business Impact of BlueBorne Security Risks VIDEO

VIDEO: Nadir Izrael, co-founder and CTO of Armis Security discusses the expanding impact of the BlueBorne bluetooth security vulnerability that his firm discovered.

SecTor Highlights Need for More Trust and Cyber-Security Regulations SLIDESHOW

The need for continued evolution of cyber-security technologies and approaches was a key theme at the 11th edition of the SecTor security conference in Toronto.

Oracle Issues Emergency Patch for Critical PeopleSoft Vulnerabilities

New PeopleSoft JoltandBleed vulnerabilities could enable an attacker to leak information and gain control of an unpatched system.

Startup Aparavi Aims to Solve Long-Term Data Retention Issues

Newcomer has built a new SaaS platform from scratch to enable organizations of all sizes to protect data either stored or aggregated on multiple clouds and on premises.

Attacks Exploit Microsoft Dynamic Data Exchange Protocol

Attackers are using Microsoft’s Dynamic Data Exchange protocol to download and install malware. Microsoft has warned about the issue, and given users guidance on how to protect themselves, but does not consider it a vulnerability.

Quad9 DNS Service Debuts to Help Improve Internet Security

The free service backed by IBM, Packet Clearing House and the Global Cyber Alliance aims to make the DNS resolver of choice for internet security.
Preventing Cyber-Attacks

North Korea Getting Ready Wage a Global Cyber War, Experts Say

NEWS ANALYSIS: Security researchers say that North Korea’s activities have changed recently in a way that may indicate that the rogue regime may be gathering the information it needs launch a global cyber-attack.
Election Polling Errors

States Starting to Implement Audits to Bolster Election Integrity

In the face of overwhelming evidence that the Russians meddled in the 2016 U.S. presidential election, states are adopting auditing measure to detect any possible direct ballot fraud and give voters confidence in the results.
Bruce Schneier SecTor

IBM's Schneier: It's Time to Regulate IoT to Improve Cyber-Security

In a keynote address at the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software and the internet of things.

Companies Must Step Up Mobile GDPR Compliance Efforts, Lookout Finds SLIDESHOW

A Lookout security report warns organizations to not forget about mobile when considering EU GDPR compliance requirements.
North Korea Hacker Groups

Researcher Provides Insight Into North Korea Cyber-Army Tactics

In a session at the SecTor security conference, a security researcher reveals details on the tools and methods used by multiple attack groups operating out of North Korea.
David Shrier SecTor

MIT Helping to Define New Model to Restore Trust in Cyber-Security

At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data privacy for cyber-security.
Gabriel Ryan Sector

EAP-TLS Detailed as WiFi Security Best Practice at SecTor

A security researcher explains how WPA2 Enterprise wireless security can be bypassed and why the EAP-TLS wireless authentication protocol should be more widely deployed to help mitigate risks.

Enterprise Tech Videos