YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

FCC committee warns of diameter signaling network vulnerabilities

Diameter signaling has similar vulnerabilities as SS7 Location tracking, interception of voice and text messages, denial of service and account fraud are all potential attack vectors associated with the Signaling System 7 protocol. And those same vulnerabilities can be applied to diameter signaling, according to...

How to improve cybersecurity with machine learning

Leveraging machine learning for cybersecurity Data breaches and cyber attacks have become harder to deter over the last few years. According to Cisco’s 2018 Annual Cybersecurity Report, for example, the expanded volume of both legitimate and malicious encrypted traffic on the web has made it...

VMware acquires E8 Security to boost endpoint management platform

VMware purchases E8 Security VMware announced last week it has acquired California-based cybersecurity startup E8 Security. Financial details of the deal were not disclosed. E8 Security's Fusion Platform leverages machine learning to identify cyber threats. Its purpose is to pinpoint malicious behavior and address vulnerabilities. As part...

Analyst Angle: Why the standardization of IoT security cannot come soon enough

  IoT device manufacturers are governed by a keen consumer demand for desirable features and intuitive functionality. Security concerns, in stark contrast, have been given relatively little thought — especially among lower-end consumer IoT products. However, striking a more equitable balance between ease of use...

Five myths about the cloud

Cloud myths debunked Practically everyone in the West has heard of “the cloud,” but not everyone knows what it means. Even those who frequently use the cloud may have misconceptions about its risks and benefits. To put rumors to rest, here are some of the...

Five cybersecurity trends to watch

Cybersecurity in 2018 The year 2017 was plagued by cybersecurity disasters, from Verizon accidently leaking the names, phone numbers and PIN codes of as many as 14 million customers to Equifax exposing sensitive personal information of nearly half the U.S. population. The year 2018 isn’t...

Hackers using encryption to deter detection, finds Cisco cybersecurity report

Cisco releases 2018 Annual Cybersecurity Report Cyber criminals are increasingly using encryption to evade detection, while security professionals are becoming more reliant on automation, machine learning and artificial intelligence (A.I.). That is at least the conclusion of Cisco’s recently published 2018 Annual Cybersecurity Report, which involved...

Commercial buildings: The evolution from intelligent to smart (Reader Forum)

For commercial buildings in 2018, four trends define the evolution of networking technology that will drive buildings from just being intelligent to being smart: mobility, cybersecurity, low voltage power and workplace efficiency. These trends continue to influence the types of network infrastructure and devices...

Thales acquires Gemalto for $5.6 billion to advance digital security

Thales outbids Atos for Gemalto French aerospace specialist Thales outbid Atos for Dutch cybersecurity provider Gemalto. The company has agreed to purchase Gemalto for $5.6 billion, surpassing Atos’s bid valued at $5.06 billion. Gemalto is considered the world’s largest manufacturer of SIM cards and credit cards....

McAfee builds security portfolio with Skyhigh acquisition

McAfee announces intent to purchase Skyhigh Networks In an effort to build upon its security portfolio, McAfee announced Monday it intends to acquire Skyhigh Networks for an undisclosed amount. The deal comes fewer than eight months after the company was spun out from Intel as...

Cisco nods to government agencies with Interpol collaboration

Cisco, Interpol partner to combat cyber criminals worldwide Following a day after Amazon Web Services (AWS) unveiled its “Secret Region” cloud service for the U.S. Intelligence Community, Cisco announced it will share threat intelligence with the international police network Interpol in a joint effort to...

Cybersecurity skills shortage exacerbating data breaches

New report finds lack of cyber skills is increasing data security threats An acute shortage of security analysis, investigation skills, application security skills and cloud computing security skills is inflaming the number of data breaches, according to a recent report titled ‘The Life and Times...

Despite ongoing enhancement, cybersecurity risks continue to encroach

  Cybersecurity breaches are a much talked about but little-addressed problem for corporations today, as every hack reveals just how hard it is to stay ahead of a technically savvy, often criminal element. In fact, the problem is so extensive that a recent study by...

Hackers manipulating employees with social engineering, warns cybersecurity consultant

Hackers increasingly using phishing emails to trick employees, cautions cybersecurity expert It’s no secret cyber attacks are on the rise, but not all cyber attacks are created equal. Many cyber attacks are specifically targeted at employees who have access to sensitive company data, resources or...

Tech experts weigh in on lack of cybersecurity progress

Cyber Psychologist and Arm CEO probe cybersecurity challenges and opportunities Santa Clara, Calif. – Cyber Psychologist Mary Aiken alongside Arm CEO Simon Segars participated in a Q&A with New York Times Contributor Don Clark at Arm TechCon, discussing why more progress with cybersecurity hasn’t been made,...

Security problems hindering IoT potential, says Arm CEO

“Cybersecurity is a mess,” says Arm CEO Santa Clara, Calif. – While advances in computing are ushering forth a new era of tech, cybersecurity is a mess and will worsen if we don’t do something about it. That is at least the conclusion of Arm CEO...

Company cybersecurity investments underscored in Trend Micro report

New Trend Micro report highlights common tactics used by cyber criminals this year Trend Micro, a cybersecurity solutions company, released its “2017 Midyear Security Roundup: The Cost of Compromise” report, highlighting security threats for the first half of 2017. The company claims to have detected...

Benefits of cyber defense go beyond company security: Vodafone

Vodafone survey examines relationship between cyber defense and company success Vodafone released a new global survey highlighting the relationship between cyber defense and business success. According to the report, which included the responses of 1,434 security decision-makers, approximately 73% of companies believe information can serve...

Kaspersky Lab launches IoT scanner

The IoT launch occurs while the FBI is reportedly urging U.S. firms to stop using Kapersky Lab’s security solutions Kaspersky Lab has released a beta version of its solution for the smart home and the internet of things (IoT) - Kaspersky IoT Scanner. This free...

Dallas group focused on cybersecurity for a smart city

Cybersecurity specialists will focused on protecting infrastructure as Dallas pursues various smart city initiatives The Dallas Innovation Alliance (DIA), a public/private partnership focuses on the design and execution of a multi-phased smart city strategy for Dallas, announced Entegra Technologies has joined the alliance a its...

How to secure smart cities from cyber vulnerabilities

Smart cities are paraded as technological utopias where everything, from traffic management to air quality control, is automated. Although the booming internet of things (IoT) offers a wealth of applications to improve city services, its success is not guaranteed. One of the great worries...

Reports: Reliance Jio deals with possible data breach

Reliance Jio says posted customer data is "unauthentic", but reports conflict Reliance Jio, India's fast-growing new market entrant with an LTE-only network, has reportedly been the subject of a massive customer data breach. The carrier said that the customer data was surfaced on the collection...

WISekey wins connected car contract with European manufacturer

The Swiss company will integrate its products in the manufacturer’s connected car solutions Swiss cybersecurity and internet of things (IoT) company WISeKey announced a contract with an unnamed European car manufacturer for development of connected car technology. The agreement includes the integration of the WISeKey IoT...

Report: Tech, telecom companies rank high as darknet targets

Owl Cybersecurity's Darknet Index puts Amazon as #1 Technology and telecommunications companies are among the companies which are most at risk for hacked data to end up on the web of private networks collectively known as the darknet, according to a recent report put together by...