Archive

Posts Tagged ‘Cybersecurity’

New Confidential Computing Consortium Includes Google, Intel, Microsoft

August 21, 2019 Leave a comment

The Linux Foundation plans to form a community to “define and accelerate” the adoption of confidential computing.

from Dark Reading: https://ift.tt/30tMnNO
via IFTTT

Bad Actors Find Leverage With Automated Active Attacks

August 21, 2019 Leave a comment

Once used only by nation-state attackers, automated active attacks have gone mainstream and allow the average cyber-criminal to gain entry and engage in malfeasance, says Chet Wisniewski, Principal Research scientist with Sophos. Luckily, organizations are getting smarter at spotting these stealthy, customized attacks earlier than they used to.

from Dark Reading: https://ift.tt/2KXC7a0
via IFTTT

Webcam woes – world’s oldest online camera struggles with security

August 21, 2019 Leave a comment

Webcams are older than you think – but the oldest one still running won’t be around much longer.

from Naked Security https://ift.tt/2TSH08e
via IFTTT

‘Phoning Home’: Your Latest Data Exfiltration Headache

August 21, 2019 Leave a comment

Companies phone enterprise customer data home securely and for a variety of perfectly legitimate and useful reasons. The problems stem from insufficient disclosure.

from Dark Reading: https://ift.tt/2NlOwqR
via IFTTT

HOAX ALERT! Facebook ‘deadline’ on making your content public is fake

August 21, 2019 Leave a comment

There’s no privacy Armageddon coming “TOMORROW!” If there was, you couldn’t copy and paste your way out of it!

from Naked Security https://ift.tt/31QKNpk
via IFTTT

7 Big Factors Putting Small Businesses At Risk

August 21, 2019 Leave a comment

Small organizations still face a long list of security threats. These threats and vulnerabilities should be top of mind.

from Dark Reading: https://ift.tt/2Zknpii
via IFTTT

How to Avoid Technical Debt in Open Source Projects

August 21, 2019 Leave a comment

Engineering teams have only a certain amount of capacity. Cutting down the volume of rework inherent in the open source business model begins with three best practices.

from Dark Reading: https://ift.tt/2Z6EReR
via IFTTT