Zero trust architecture designed for Unified Endpoint Security
BlackBerry has announced the BlackBerry Spark platform with a new Unified Endpoint Security (UES) layer which can work with BlackBerry Unified Endpoint Management (UEM) to deliver zero trust security.
Partnership for embedded cyber security
Secure-IC has announced a collaboration with Winbond to enhance embedded cyber security for software in automotive and other connected industries. Under the partnership, Secure-IC will offer an enhanced security platform that supports the whole security lifecycle in complementary fashion with the use of Winbond TrustME Secure Flash Memory.
Countries most at risk of cyber crime ranked
The severity of cyber-breaches has become more and more intense in recent years. As a result, security experts at Specops Software sought to find out which (Western) European countries are the most at risk of cyber crime for citizens.
Taking a zero-trust approach to security
For many organisations, zero trust security has reached the top of the CISO agenda. While the zero-trust model has been around for a few years, it has rapidly gained momentum in recent times. Its popularity is driven by the digitalisation of the workplace which has made the network perimeter more porous. By Darran Rolls, CTO, SailPoint
Detect cyber attacks on smart devices in the home
A novel system capable of detecting and classifying cyber attacks on smart devices around our homes has been developed by experts at Cardiff University. The system can distinguish between malicious or benign activity and detect attacks on devices such as the Amazon Echo Dot and Apple TV with a 90% accuracy.
Internet overwhelmed by identity theft worries
A new report from cyber security provider F-Secure has found that a steady barrage of major data breaches have left a vast majority of consumers worried about the online crimes that lead to identity theft and account takeovers.
Liveness detection provides security against identity fraud
Mitek has announced new innovation in its Liveness Detection feature. As a provider of Liveness Detection, Mitek is extending its technology to offer virtually spoof-proof facial comparison across all digital channels (native and web) - through one simple selfie. There are no additional steps for the consumer.
Context-sensitive application security training
Parasoft has announced a partnership with HackEDU, an interactive cyber security training company. This new partnership will allow organisations to train their developers and testers with context-sensitive application security training on the latest threats and mitigations for modern secure software development.
Cyber security dictates stability of societies
TÜV Rheinland, an international provider of testing, inspection and certification services, has released its seventh annual report on cyber security trends for 2020. The report is a collaboration between many of TÜV Rheinland‘s leading cyber security experts globally, and discusses seven key cyber security trends which will be important to be aware of in 2020.
When should you to secure your embedded systems?
Earlier this spring, a report was published describing how hackers used a network-connected, but unsecured, fish-tank thermometer in a casino lobby to break into the network and steal data. The incident raises yet another spotlight on how vulnerable embedded systems can be without proper protection. By Scott Jones, Managing Director, and Nathan Sharp, Sr. Business Manager, Embedded Security