Posts in tag

Cybersecurity


Whether it’s turkey and stuffing for U.S. Thanksgiving, jiao zi to celebrate the Chinese New Year, or mithai for Diwali – holidays typically mean food. The way your food gets from the farm to your fork is changing – and technology is playing a vital role. Robots are already taking orders in burger joints, social …

IBM Security launched a new service that allows companies to experiment with fully homomorphic encryption (FHE) – an emerging technology designed to allow data to remain encrypted even while being processed or analyzed in cloud or third-party environments. The new IBM Security Homomorphic Encryption Services provide companies with education, expert support, and a testing environment …

PhoenixNAP®, a global IT services provider offering security-focused cloud infrastructure, dedicated servers, colocation, and specialized Infrastructure-as-a-Service (IaaS) technology solutions, announced collaboration with Sagenext, a US-based tax and accounting software hosting provider. The company leverages phoenixNAP’s dedicated server platform to provide specialized application hosting solutions to businesses looking to move their tax and accounting software to …

Rackspace Technology™, a leading end-to-end multicloud technology solutions company, will co-sponsor The New Cybersecurity Landscape virtual event with Armor® on October 7th at 10:00 am CT as part of the company’s Solve Strategy Series. From Zoom bombing to account takeovers, through access mining and phishing, the event will shed light on emerging security threats and empower viewers with …

IBM Security announced a new risk-based service designed to help organizations apply the same analytics used for traditional business decisions to cybersecurity spending priorities. IBM’s new Risk Quantification Services creates risk assessments to help clients identify, prioritize and quantify security risk as they weigh decisions such as deploying new technologies, making investments in their business …

Nowadays, manufacturers can connect their devices to the Alexa voice speaker system or integrate Amazon’s assistant directly into their products. This integration requires that their devices undergo a series of tests to validate that they meet all of Amazon’s requirements, including new cybersecurity requirements (secure booting, hardware encryption, key storage, privileges, etc.). To this end, …

The CERT at Retarus has issued a warning regarding phishing emails in which recipients are instructed to edit important business partner contracts. The phishers pretend to make the document available on the otherwise reputable Dotloop platform, directing the recipients to a fake login page for their Microsoft account. The fraudulent emails bear the Microsoft logo as …

Watch out, these applications have vulnerabilities with the highest share of exploits used by cybercriminals. Microsoft Office Suite, Android applications, and browsers are the three most common targets of cybercriminals during cyber attacks, according to the latest analysis of the AO Kaspersky Lab which was conducted for Q3 2019. These three accounts for 95.41% of …

In light of the current situation with COVID-19, public sector agencies are turning to the cloud more than ever, particularly as people increasingly need access to information and government services. Today, we’re happy to share more on our efforts to help governments with their COVID-19 needs and also highlight a few recent agreements with state …

With so much information stored in the cloud, the consequences of cyber-breaches are only increasing in severity. Some countries are better prepared than others when it comes to these threats. It is important to know the vulnerability of your own country in order to gauge if you’re doing enough when it comes to ensuring the …