Security

Research by a cybersecurity services provider reveals how widespread the risks are to executives and the organizations they ramrod from data brokers collecting sensitive data about them. "We see corporate executives targeted all the time in their personal lives," BlackCloak Founder and CEO Chris Pie...

A TechNewsWorld exclusive interview with Appdome CEO Tom Tovar about no-code technology, the state of mobile app security and fraud prevention.

Since many of its members could flock to alternative platforms, the massive takedown of RaidForums might have little real impact against the large volume of hackers operating worldwide.

Forrester also called out the work-from-anywhere trend as a major threat in 2022. It explained that an anywhere-work model presents an opportunity to create new kinds of sensitive data.

Security-minded internet users looking for another layer of obscurity when traveling in cyberspace can have it with some new tech from Atlas VPN. The paid VPN service has introduced a new way to route internet traffic that's more secure and private than conventional methods. It does that by allowing...

Foundries.io and Arduino are joining forces to make embedded Linux-powered internet of things and edge computing devices more secure. The deal will combine technological innovations with Foundries' cloud-native development and deployment enterprise solutions for secure IoT and edge devices. Those so...

IT security firm NeoSystems last week announced it would host a panel of experts from the private and public sectors Tuesday centered around the cybersecurity implications of the ongoing conflict in Ukraine. TechNewsWorld sat in on the Zoom-delivered panel discussion.

The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.

Launched under the name Developer Tools, 1Password declared the new features will help developers easily and securely generate, manage and access secrets in their normal workflows. The tools will also help simplify complex processes and improve security

SPOTLIGHT ON SECURITY

Beware the Ides of March Madness

This annual event is a most-popular time for betting pools and bracket challenges -- when employees often use websites, online platforms, or shared spreadsheets to organize. Hackers have countless ways to entice you to engage with them. These ruses include the promise of bigger winnings or insider i...

Internal documents recently leaked by a member of the Conti ransomware group reveal the gang's status as a multi-layered business organization. These chat logs present a deep dive into the gang's revenue numbers, leaders, recruiting practices and operations, and victims.

Under the new Critical Infrastructure Defense Project, companies in particularly vulnerable industries -- such as hospitals and water and power utilities -- will have access to the full suite of Cloudflare's Zero Trust solution, CrowdStrike's endpoint protection and intelligence services, and Ping I...

Stand-alone automation platforms and low-code software tools in recent years enable vendors to increase sales of products designed for specific roles and functions directly to business users. Often, this puts IT management at arm's length from enforcing governance and security standards.

Hours before Russia began its Ukraine invasion on Feb. 24, Microsoft found a new malware package, which it dubbed "FoxBlade." As more concerns about malware fallout from the war spread, several cybersecurity firms announced protective measures for potential victims.

Technewsworld Channels