Perceived wisdom is that mobile voting will be open to significant opportunities for interception, manipulation and nation-state interference. Nimit Sawney, CEO of Voatz, describes the architecture of a secure mobile voting system.
Identity and access management shouldn't feel like a catch-22. On the one hand, you want to allow employees to work as they need to, which is often on the road or at home, not at the office. On the other hand, not a day goes by without security breaches making headline news. And you don't want to be that headline....
With internet connectivity getting added to an increasing number of products, privacy and security risks abound. But buyers may be unaware. A team of Carnegie Mellon University researchers aims to change that, by clear labeling of connected devices and the risks they may pose.
Ransomware gangs keep innovating: Maze has begun leaking data on behalf of both Lockbit and RagnarLocker, while REvil has started auctioning data - from victims who don't meet its ransom demands - to the highest bidder. Thankfully, security experts continue to release free decryptors for some strains.
The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations, specifically attackers impersonating a trusted device could conduct...
A hacking group is deploying a new malware strain dubbed USBCulprit that uses USBs and other storage devices to steal data, according to research from the security firm Kaspersky.
The latest edition of the ISMG Security Report sizes up progress made so far on identity management and the work yet to be done. Also featured: how security concerns are holding back IoT projects and the privacy issues raised by recording videoconferences.
How have the cybersecurity challenges facing healthcare organizations changed during the COVID-19 pandemic? And how are organizations responding? Information Security Media Group's Healthcare Cybersecurity Virtual Summit, to be held on June 9 and replayed June 10 and 11, will provide insights.
Purpose-built backup appliances (PBBAs) have been foundational components to many organizations' backup/recovery infrastructure for more than a decade. The importance of PBBAs is illustrated in the numbers: According to IDC, in 2019, the data replication and protection (DR&P) market was approximately $9.2 billion,...
The cloud-native containerized applications that have emerged over the last decade
were originally used for stateless web services. But today, cloud native applications
have matured, and along with advanced container orchestrator capabilities, we are
seeing customers deploy both stateless and stateful workloads in...
This ESG Lab Review documents the results of extensive performance testing conducted on the Dell EMC Integrated Data Protection Appliance (IDPA) and a competitive server grid appliance technology solution. Testing focused on the ability of each solution to efficiently protect virtual environments at...
Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey. Here's what enterprises need to keep in mind when selecting security technology for IoT.
The world has experienced an unprecedented business disruption that instantly created the largest remote workforce - and largest attack surface - in history. How do you validate users and access in this new dynamic workforce? RSA's Steve Schlarman and Ben Smith preview an upcoming series of virtual roundtables.
The right endpoint management strategy can reduce costs fast - a critical need in today's dynamic cybersecurity and business environment. Great efficiencies are possible by reducing tool sprawl, increasing staff productivity and streamlining operational processes.
Download this white paper and learn:
The 5-step...
How organizations in the most demanding and complex environments are leveraging Tanium to build resilience, maintain business continuity, and manage their long-term risk for today, tomorrow, and the new normal.
This paper discusses:
Endpoint Management and Security in the Age of COVID-19
Why Internal Endpoint...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.