Posts in tag

Security


SaltStack®, the creators of intelligent automation for security operations and IT teams, today announced several new features and capabilities introduced in version 6.2 of SaltStack Enterprise, SaltStack Protect, and SaltStack Comply. Now generally available, SaltStack Protect integrates infrastructure automation and configuration management with the Tenable.io vulnerability management solution for closed-loop vulnerability remediation. SaltStack Comply now includes …

HP has been named a leader in the IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2019-2020 Vendor Assessment (doc #US44811119, December 2019). The report recognized HP’s holistic approach to cybersecurity across its Print and PC businesses. HP’s comprehensive security strategy and solutions are paramount in an era of escalating cyberthreats. More than 7.9 billion records …

Microsoft has announced new Azure Security enhancements at their Microsoft Ignite Conference held last November. These new features are designed to help customers with their security, compliance, and identity requirements. Coverage with platform for community and partners (In Preview) Use Security Center to receive recommendations not only from Microsoft but also from existing solutions from …

According to a cybersecurity expert, there are real-life lessons to learn from Empire’s downfall. Hsinchun Chen, professor of management information systems at the University of Arizona, has spent 27 years researching cyber security and leads a project called “Hacker Web” to explore international hacker communities, including those in Russia, China, and the United States. Chen …

A virtual private network (VPN) will not only strengthen your personal security when browsing in the internet. It can also help you in protecting your business. Here are seven reasons why getting a VPN for your business is a great investment. 1. Security is heightened. This is the main benefit you will be getting from …

IBM announced last 20 November 2019 Cloud Pak for Security, featuring industry-first innovations to connect with any security tool, cloud or on-premise system, without moving data from its original source. Available today, the platform includes open-source technology for hunting threats, automation capabilities to help speed response to cyberattacks, and the ability to run in any …

Android Dev Summit 2019 | Secure Your Data – Deep Dive into Encryption and Security Strategies for data encryption on Android using Jetpack Security, key takeaways: learn to encrypt data safely on device and use the AndroidKeyStore. 1. Outline the challenges with data-at-rest encryption. 2. Best practices for data encryption and key management. 3. Deep …

In essence, a virtual private network (VPN) connects your device to another computer known as a server. You can then gain internet access using the server’s internet connection. What would I need it for? Seems straightforward enough. But why would you go the extra mile to use another computer just to browse the internet? That …

In late February 2019, the Internet Corporation for Assigned Names and Numbers (ICANN), the organization that manages the IP addresses and domain names used on the web, issued a warning on the risks of systemic Internet attacks. Here is what you need to know about what is at stake. What is the DNS? The Domain Name …

Consumer-grade internet of things (IoT) devices aren’t exactly known for having tight security practices. To save purchasers from finding that out the hard way, researchers have done security assessments of representative devices, awarding scores ranging from 28 (an F) up to 100. Their site, yourthings.info, shows rankings for 45 devices, though researchers have evaluated a total …