Alphabet unveils new cyber security business
Google parent company Alphabet announced it is deploying a new security firm dubbed Chronicle, with the aim of helping businesses recognize and thwart cyber attacks. The company will leverage Google’s computing and storage infrastructure, as well as machine learning...
McAfee representative highlights cyber security issues facing modern-day networks
AUSTIN--Conventional architecture is not sufficient to deal with the onslaught of cyber security issues in the digital realm. That is the insight of Brett Kelsey, vice president and chief technology strategist for the Americas with McAfee....
In a recent blog post Eric Ehlers, marketing manager for manufacturing and energy at Cisco, noting the numerous opportunities for cyber exploitation faced by manufacturers--legacy equipment with dated or no security protocols, an IT/OT disconnect, guidelines laying out responsibilities and access and "never conducting...
Virtual networks: a bullseye for hackers
Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...
O2 enterprise customers will have access to BAE’s Managed Security Services and Cyber Technical Service capabilities.
U.K. telecommunications company O2 signed an agreement with security solutions provider BAE Systems to provide cybersecurity solutions for enterprise customers. The partnership will provide O2 customers with access...
Along with interoperability, securing the internet of things is a major priority in a smart city
WASHINGTON--Advances in communications technology, primarily reduced costs of devices and computing power, has set the stage for the internet of things to transform urban areas into smart cities, which...
Mobile operators should look to sports fans as a way to educate them on potential security threats and the opportunity to sell new services.
Mobile has changed the way people experience sporting events as fans shift to the digital arena to...
Consumer demand for mobile connectivity and cloud-based platforms has resulted in mobile networks transmitting more data than ever, which puts carriers in a prime spot to use analytics in order to glean insight into what is actually moving across their networks. However, growing demand...
A major distributed denial of service (DDoS) attack on Friday knocked out access to major websites including Netflix, Reddit, Spotify and Airbnb. As security experts have concluded, the attack was apparently carried out when bad actor(s) leveraged internet-connected devices including security cameras to overwhelm...
Bastille, which focuses on security for enterprise "internet of things" deployments, announced a new solution that uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security. The services is designed to enable the ability to sense,...
Bastille, an enterprise IoT security company, announced the availability of its new service to protect internet of things enterprises from information and security threats. Bastille’s solution uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security....
The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure log in authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have...
The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...
Plea agreement, first reported by Ars Technica, sold Verizon customer info to private investigator for five years
As the internet of things, particularly wearables, continues to perpetuate, so too does the conversation around access and dissemination of personal data. But, as a plea deal struck...
Securing the industrial IoTÂ
The Industrial Internet Consortium, an organization formed to accelerate the industrial "internet of things," today published the Industrial Internet Security Framework, a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five IIoT characteristics: safety,...
Securing the industrial IoTÂ
The Industrial Internet Consortium (IIC), an organization formed to accelerate the industrial internet of things (IIoT), today published the Industrial Internet Security Framework (IISF), a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five...