Top

Category: Security


Security

FCC commissioner calls on Google, Apple to remove TikTok from app stores

June 29, 2022

Via: RCR Wireless News

Federal Communications Commissioner Brendan Carr has asked Google and Apple to remove popular social media app TikTok from their application stores, saying that the app “harvests swaths of sensitive data that new reports show are being accessed in Beijing.” Carr […]


Security

It’s Time to Recession-Proof Your Network and Security Architecture

June 28, 2022

Via: The Fast Mode

Interest rates are rising, US Inflation is at its highest point in over 40 years, the stock market has dropped into bear territory, Q1 22 venture funding has dropped by 19%, and analysts are suggesting a recession is around the […]


Security

Major Retailer Converges Network and Security Systems With Fortinet Secure SD-WAN

June 24, 2022

Via: CSO

For most retailers, effective networking must deliver on the three Ps: protection, performance, and price. One major retailer with more than 1,700 stores had found that its legacy network was failing to meet any of these touchstones. For one, it […]


Security

Cisco reports vulnerabilities in products including email and web manager

June 23, 2022

Via: CSO

Cisco has issued alerts for a vulnerability found in its email security and web management products that could allow an authenticated remote actor to retrieve sensitive information from an affected device. An advisory issued by Cisco this week outlined that […]


Security

Location data poses risks to individuals, organizations

June 16, 2022

Via: CSO

The market for you and your device’s location is enormous and growing. That data is collected by your network provider, by apps on your smart devices, and by the websites with which you engage. It is the holy grail of […]


Monitoring&Analysis, Security

Assessing Network Analysis and Visibility Solutions for Zero Trust

June 13, 2022

Via: CSO

The rising trend of zero trust implementation is a direct reaction to increasingly sophisticated cyberattacks. Zero-trust principles foster more effective threat detection because they reject the notion that security happens at the perimeter and that all network traffic is legitimate […]


Security

9 types of computer virus and how they do their dirty work

June 10, 2022

Via: CSO

The human mind loves to categorize things, and malware is no exception. We here at CSO have done our part: our malware explainer breaks down malware based on how it spreads (self-propagating worms, viruses piggybacking on other code, or sneakily […]


Security

Research finds Zero Trust, cloud and remote work drive digital resiliency 

June 10, 2022

Via: Data Centre & Network News

A10 Networks has published global research revealing the challenges and priorities of enterprise organisations in today’s post pandemic era, as we learn to live with COVID-19, and how this is shaping future technology requirements. Of the 250 enterprise organisations surveyed […]


Security

Hackers using stealthy Linux backdoor Symbiote to steal credentials

June 9, 2022

Via: CSO

Researchers have come across a stealthy Linux backdoor that uses sophisticated techniques to hide itself on compromised servers and steal credentials. Dubbed Symbiote because it injects itself into existing processes, the threat has been in development since at least November […]


Security

How the Colonial Pipeline attack has changed cybersecurity

June 7, 2022

Via: CSO

It’s been just over a year since the American public got a taste of what a cyberattack could do to their way of life. A ransomware sortie on Colonial Pipeline forced its owners to shut down operations and leave half […]