NSA Releases Guidance on Zero-Trust Architecture
A new document provides guidance for businesses planning to implement a zero-trust system management strategy. ...
The Edge Pro Tip: Fasten Your Seatbelts
An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies for 2021. Where do they plan to spend next? ...
Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk
In this interview, Camille Stewart, Google’s Head of Security Policy for Google Play and Android explains how understanding how systemic racism influences cyber security is integral to protecting the American people...
Securing Super Bowl LV
A peek at open XDR technology, and defense that held up better than the Kansas City Chiefs. ...
Attackers Turn Struggling Software Projects Into Trojan Horses
While access to compromised systems has become an increasingly common service, some cybercriminals are going straight to the source: buying code bases and then updating the application with malicious code. ...
Oxford University COVID‑19 lab hacked
Neither clinical research into the coronavirus nor any patient data were affected by the incident The post Oxford University COVID‑19 lab hacked appeared first on WeLiveSecurity
After a Year of Quantum Advances, the Time to Protect Is Now
Innovations in quantum computing mean enterprise and manufacturing organizations need to start planning now to defend against new types of cybersecurity threats. ...
Safeguarding children against cyberbullying in the age of COVID‑19
As screen time has increased, so has the risk of cyberbullying. What you can do to help protect your children from online harassment? The post Safeguarding children against cyberbullying in the age of COVID‑19 appeared first on WeLiveSecurity
North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry.
Attributing the attacks with high...
Championing worthy causes: How ESET gives a helping hand
A snapshot of some of the ways ESET makes an impact supporting the well-being of people, communities and the environment The post Championing worthy causes: How ESET gives a helping hand appeared first on WeLiveSecurity