Latest Posts

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020

August 12, 2020 Added by:InfosecIsland News

The official Call for Presentations (speakers) for SecurityWeek’s 2020 Industrial Control Systems (ICS) Cyber Security Conference, being held October 19 – 22, 2020 in SecurityWeek’s Virtual Conference Center, has been extended to August 31st.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

SecurityWeek to Host Cloud Security Summit Virtual Event on August 13, 2020

August 12, 2020 Added by:InfosecIsland News

SecurityWeek will host its 2020 Cloud Security Summit virtual eventon Thursday, August 13, 2020.

Comments  (0)

F3bd25e6f3b8f01dc21a92182761fb8a

Avoiding Fuelling the Cyber-Crime Economy

August 11, 2020 Added by:Marc Wilczek

What drives the cyber-crime economy, and how can organizations prevent their data being used as a criminal commodity?

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Expect Behavioral Analytics to Trigger a Consumer Backlash

August 10, 2020 Added by:Steve Durbin

The deployment of cameras, sensors and applications in public and private places for behavioral analytics will be followed by consumer and regulatory backlash.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Holding public cloud security to account

August 10, 2020 Added by:Avishai Wool

The public cloud provides great flexibility and cost management for organizations, but what about security?

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

No Silver Bullet for Addressing Cybersecurity Challenges During Pandemic

August 10, 2020 Added by:Liviu Arsene

As the coronavirus pandemic forced organizations to migrate to a work-from-home context, security professionals faced new challenges.

Comments  (0)

5fbfa7473f12e37a0ebbc623dcd9619f

Could the Twitter Social Engineering Hack Happen to You?

August 10, 2020 Added by:Tim Mackey

The phishing attack on Twitter employees serves as an opportunity for all businesses to reassess how they build and deploy application

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Augmented Reality Will Compromise the Privacy and Safety of Attack Victims

July 08, 2020 Added by:Steve Durbin

Augmented Reality (AR) technologies will provide new opportunities for attackers to compromise the privacy and safety of their victims.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Ending the Cloud Security Blame Game

July 08, 2020 Added by:Avishai Wool

Security is primarily your responsibility – with help from the cloud provider.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Edge Computing Set to Push Security to the Brink

June 13, 2020 Added by:Steve Durbin

In the coming years, poor implementation of edge computing solutions will leave organizations open to attack.

Comments  (0)