YOU ARE AT:TagsCyber security

BROWSING: cyber security

Alphabet launches security firm Chronicle to advance threat detection

Alphabet unveils new cyber security business Google parent company Alphabet announced it is deploying a new security firm dubbed Chronicle, with the aim of helping businesses recognize and thwart cyber attacks. The company will leverage Google’s computing and storage infrastructure, as well as machine learning...

Need for better security architecture underscored by McAfee

McAfee representative highlights cyber security issues facing modern-day networks AUSTIN--Conventional architecture is not sufficient to deal with the onslaught of cyber security issues in the digital realm. That is the insight of Brett Kelsey, vice president and chief technology strategist for the Americas with McAfee....

IoT security top of mind for smart manufacturing

In a recent blog post Eric Ehlers, marketing manager for manufacturing and energy at Cisco, noting the numerous opportunities for cyber exploitation faced by manufacturers--legacy equipment with dated or no security protocols, an IT/OT disconnect, guidelines laying out responsibilities and access and "never conducting...

Stages of a cyber attack

Virtual networks: a bullseye for hackers Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...

O2 offers enterprise security solutions through agreement with BAE Systems

O2 enterprise customers will have access to BAE’s Managed Security Services and Cyber Technical Service capabilities. U.K. telecommunications company O2 signed an agreement with security solutions provider BAE Systems to provide cybersecurity solutions for enterprise customers. The partnership will provide O2 customers with access...

Security is a major challenge to smart city adoption

Along with interoperability, securing the internet of things is a major priority in a smart city WASHINGTON--Advances in communications technology, primarily reduced costs of devices and computing power, has set the stage for the internet of things to transform urban areas into smart cities, which...

Reader Forum: Is love of sports increasing mobile subscribers’ risks of malware attacks?

Mobile operators should look to sports fans as a way to educate them on potential security threats and the opportunity to sell new services. Mobile has changed the way people experience sporting events as fans shift to the digital arena to...

Editorial Webinar: Securing mobility and cloud in the age of analytics

Consumer demand for mobile connectivity and cloud-based platforms has resulted in mobile networks transmitting more data than ever, which puts carriers in a prime spot to use analytics in order to glean insight into what is actually moving across their networks. However, growing demand...

Massive cyberattack reiterates IoT security concerns

A major distributed denial of service (DDoS) attack on Friday knocked out access to major websites including Netflix, Reddit, Spotify and Airbnb. As security experts have concluded, the attack was apparently carried out when bad actor(s) leveraged internet-connected devices including security cameras to overwhelm...

Bastille releases IoT security solution to protect enterprises from attacks

Bastille, which focuses on security for enterprise "internet of things" deployments, announced a new solution that uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security. The services is designed to enable the ability to sense,...

Bastille releases IoT security solution to protect enterprises from attacks

Bastille, an enterprise IoT security company, announced the availability of its new service to protect internet of things enterprises from information and security threats. Bastille’s solution uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security....

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure log in authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have...

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...

Verizon tech pleads to selling customer call data

Plea agreement, first reported by Ars Technica, sold Verizon customer info to private investigator for five years As the internet of things, particularly wearables, continues to perpetuate, so too does the conversation around access and dissemination of personal data. But, as a plea deal struck...

IIC releases official framework for industrial IoT security

Securing the industrial IoT  The Industrial Internet Consortium, an organization formed to accelerate the industrial "internet of things," today published the Industrial Internet Security Framework, a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five IIoT characteristics: safety,...

IIC releases official framework for industrial IoT security

Securing the industrial IoT  The Industrial Internet Consortium (IIC), an organization formed to accelerate the industrial internet of things (IIoT), today published the Industrial Internet Security Framework (IISF), a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five...