JSOF has discovered a series of vulnerabilities stemming from one small software library that has rippled across the supply chain, affecting 100's of millions of IoT devices.
4iQ released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing campaigns.
According to the 2020 Thales Access Management Index – U.S. and Brazil Edition1– four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused user credentials.
To help agencies understand and effectively manage encryption keys, SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC), in collaboration with the Federal Partnership for Interoperable Communications (FPIC), developed the Encryption Key Management Fact Sheet. Public safety organizations can leverage the Fact Sheet's information and familiarize themselves with the many aspects of encryption key management.
Recently, data tokenization has proved to be a successful protection method for securing sensitive information and all instances of personal data. This is because it allows information to retain its analytical value, while ensuring that it meets regulatory requirements.
Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offers further security for those outside the corporate walls and ensures IT teams can more easily monitor and resolve any potential issues faster and easier. The workforce of tomorrow will see remote work security and cellular connectivity go hand-in-hand.
Whether it's fever detection or no-touch visitor management, what are some new solutions that may help protect an enterprise's assets and properties during COVID-19?
Microsoft's Azure Security Center (ASC), which regularly searches for and researches for new attack vectors against Kubernetes workloads, revealed a new campaign that was observed recently targeting Kubeflow, a machine learning toolkit for Kubernetes.