Cybersecurity

Recipe For Success: How Technology Is Making Food Safer
Whether it’s turkey and stuffing for U.S. Thanksgiving, jiao zi to celebrate the Chinese New Year, or mithai for Diwali – holidays typically mean food. The way your food gets from the farm to your fork is changing – and technology is playing a vital role. Robots are already taking orders in burger joints, social …

IBM Helps Prepare Clients For Next Generation Encryption Technology
IBM Security launched a new service that allows companies to experiment with fully homomorphic encryption (FHE) – an emerging technology designed to allow data to remain encrypted even while being processed or analyzed in cloud or third-party environments. The new IBM Security Homomorphic Encryption Services provide companies with education, expert support, and a testing environment …

Sagenext Relies On PhoenixNAP To Deliver Superior Tax And Accounting Software Hosting Services
PhoenixNAP®, a global IT services provider offering security-focused cloud infrastructure, dedicated servers, colocation, and specialized Infrastructure-as-a-Service (IaaS) technology solutions, announced collaboration with Sagenext, a US-based tax and accounting software hosting provider. The company leverages phoenixNAP’s dedicated server platform to provide specialized application hosting solutions to businesses looking to move their tax and accounting software to …

Rackspace Technology And Cloud Security Leader, Armor, Announce The New Cybersecurity Landscape Solve Strategy Series Webinar
Rackspace Technology™, a leading end-to-end multicloud technology solutions company, will co-sponsor The New Cybersecurity Landscape virtual event with Armor® on October 7th at 10:00 am CT as part of the company’s Solve Strategy Series. From Zoom bombing to account takeovers, through access mining and phishing, the event will shed light on emerging security threats and empower viewers with …

IBM Brings Risk Analytics To Security Decision Making
IBM Security announced a new risk-based service designed to help organizations apply the same analytics used for traditional business decisions to cybersecurity spending priorities. IBM’s new Risk Quantification Services creates risk assessments to help clients identify, prioritize and quantify security risk as they weigh decisions such as deploying new technologies, making investments in their business …

Vaud-based Cybersecurity Specialist Kudelski Partners With Amazon
Nowadays, manufacturers can connect their devices to the Alexa voice speaker system or integrate Amazon’s assistant directly into their products. This integration requires that their devices undergo a series of tests to validate that they meet all of Amazon’s requirements, including new cybersecurity requirements (secure booting, hardware encryption, key storage, privileges, etc.). To this end, …

Phishers Are Posing As Contract Partners To Access Company Data
The CERT at Retarus has issued a warning regarding phishing emails in which recipients are instructed to edit important business partner contracts. The phishers pretend to make the document available on the otherwise reputable Dotloop platform, directing the recipients to a fake login page for their Microsoft account. The fraudulent emails bear the Microsoft logo as …

The Most Vulnerable Applications Used By Cybercriminals In Cyber Attacks
Watch out, these applications have vulnerabilities with the highest share of exploits used by cybercriminals. Microsoft Office Suite, Android applications, and browsers are the three most common targets of cybercriminals during cyber attacks, according to the latest analysis of the AO Kaspersky Lab which was conducted for Q3 2019. These three accounts for 95.41% of …

How Google Cloud Is Helping U.S Public Sector Agencies During The COVID-19 Pandemic And Beyond
In light of the current situation with COVID-19, public sector agencies are turning to the cloud more than ever, particularly as people increasingly need access to information and government services. Today, we’re happy to share more on our efforts to help governments with their COVID-19 needs and also highlight a few recent agreements with state …

The 5 Most Cyber-Insecure Countries In Europe
With so much information stored in the cloud, the consequences of cyber-breaches are only increasing in severity. Some countries are better prepared than others when it comes to these threats. It is important to know the vulnerability of your own country in order to gauge if you’re doing enough when it comes to ensuring the …