Security

The Digital Future of Education, and the End of Snow Days

Healthcare may be the first industry that many people think of when they think of sectors that suddenly had to adjust dramatically because of the COVID-19 pandemic. But ask parents around the world, and they’ll probably say “education.” Within a matter of weeks, the traditional classroom has turned on its head, and some of those…

Emerging Threats During Emergency Times: Insights from Phil Jones at Airbus Cybersecurity

The global pandemic has underscored the value of planning for the unexpected. Opportunistic criminals exploit constantly evolving work conditions and strained defense forces to cause a increase in attacks. Although there was no way to completely predict the effect on our organizations and be armed with a comprehensive plan from day one, there is plenty…

Warning Signs for a Downward Spiral Startup

Many start-ups on information security bring much needed creative thinking and new ideas into a demanding professional field. Others don’t bring anything to the table, and in some situations, they can potentially affect the security posture of an organization. Why can business customers make more informed choices about the companies they are spending time and…

The Essential Things You Need To Do To Stay Safe Online

The internet is a risky place with all the hacks, scams, and malware taking advanced forms every day. The multitude of devices using the internet, from cell phones to tablets to laptops, has made us even more vulnerable by opening risky gateways. For that matter, we have brought the essential security measures that you can…

Role-Based Access Control – The Basics

Business leaders tend to place a lot of faith in their intuition and judgment. Inherently, they trust the people hired to have the best interest of the company and believe proper care will be taken regarding security. This isn’t always the case. According to IBM, “Insider threats account for 60 percent of cyberattacks, and they…

5 Steps to Validate the Security Controls of an Organization

Nowadays, (almost) every organization is moving to the cloud, thanks to its long list of benefits like eco-friendliness, improved performance and scalability, and reduced costs. But cloud storage and systems do not come without their issues with cybersecurity being one of the most important issues with the cloud. With cloud computing and storage adoption quickly…

New Blindspot in Cybersecurity

The main tool used for access control and authentication has been since the advent of machines, usernames, and passwords. However, as post mortem review shows in most data breaches, compromised identities have become the main attack point for today’s cyber adversaries. Nonetheless, a recent Identity Defined Security Alliance (IDSA) study shows that credential-based data breaches…

UEFI Scan Engine in Microsoft Defender ATP

Microsoft has expanded Microsoft Defender Advanced Threat Protection (ATP) protection capabilities with the addition of a Unified Extensible Firmware Interface (UEFI) scanner. Despite hardware and firmware-level attacks rising in frequency over the past couple of years, Microsoft has decided to expand the functionality of its security solution to ensure it can keep users safe. Two…

Samsung Galaxy Watch Active 2 Supports Service as a Blood Pressure Monitor

My primary wearables usage is to track my sleep, stress and running. While the Apple Watch’s ECG function was vital to some folks, I tried the ECG several times and got normal readings so it was of limited value to me. Sometime this year, this feature will also come to users of Galaxy Watch. One…

Android App Hacking Demonstrated by Researcher Through Intent

A security researcher was able to compromise an Android application by invoking every component of its exposed Activity. The problem, explains Therese Mendoza of Trustwave, is not widespread, but it does exist and it could be exploited by attackers to cause Android apps to leak sensitive information that could then be misused for further compromise….