The research from Florida State University and Rutgers University scientists aims to establish a new level of security for voice biometrics and claims that the tech is vulnerable to spoofing.
Dr. Boaz Gelbord has joined Akamai Technologies as senior vice president and chief security officer. Gelbord will assume direct leadership of Akamai’s existing information security organization which includes responsibility for cybersecurity, information security compliance, and the protection of Akamai’s systems
The ethical issues that exist around the wake of discovered security vulnerabilities are vast and murky. Far too often, the conversation about how and when to disclose security weaknesses shifts from a dialogue to a one-way monologue. What's a security leader to do?
Those on the cyber threat frontlines may view the entire FireEye-SolarWinds catastrophe through a very different lens. It’s a mile-high view that proves a thesis: why data must be smart and able to protect itself from cybercriminals – no matter where it goes, where it’s stored or who has it.
March 31st is World Backup Day 2021, the 10th anniversary of the inaugural World Backup Day in 2011. Though the day serves as a reminder to backup your data, this process should be done frequently to offset the risk of data loss - or the intentional or unintentional destruction of information, which may be caused by people or processes from within or outside of an organization.
The pandemic has accelerated digital transformation for many organizations. Global remote work and increased digital interactions means an exponential growth in digital footprint for individuals, as well as corporations. Having to store, process and move this much data quickly into the cloud and manage the expanded digital footprint requires agility of decision making and security and privacy by design implementation and operation.
Another challenge is the new home office, where spouses may be working remotely, often alongside their children attending school online. Home networks lack typical protections and bifurcations of the corporate office and may be prone to attacks using lateral movement techniques. In these scenarios, after gaining initial access through an insufficiently protected device, such as a family computer, attackers move deeper into a network, searching for other devices to compromise or obtain increased privileges. This continued probing could eventually lead to the exfiltration of sensitive corporate data or high-value intellectual property.