What skills should aspiring information security workers possess and work on? What certifications can come in handy more than others? What strategies should organizations employ to develop a well-staffed cybersecurity team? Where should they look for talent? What advice do those already working in the field have for those who want to enter it? (ISC)² wanted to know the answer to these and other questions, so they asked 1,024 infosec professionals and 1,010 cybersecurity job … More →
To realize the full potential of online services, identity verification solutions are required to avoid fraud and boost trust in the systems, for both end users and organizations. In-person data verification can be performed by a service agent easily, usually by asking for a physical ID card, like a driver’s license, and referencing it against the application documents and person present, but how can this be done online? Enter verifiable credentials. Verifiable credentials provide a … More →
The post Verifiable credentials are key to the future of online privacy appeared first on Help Net Security.
Application programming interfaces (APIs) are at the core of nearly every digital experience – whether that is the delivery of mobile apps that enable consumers to monitor and personalize their exercise routines using an IoT connected device, or making it easy for car owners to track and share their in-vehicle driving behaviors with an insurer, or enabling remote monitoring services that allow patients with chronic conditions to record and report their daily stats and receive … More →
According to Aqua Security’s 2021 Cloud Native Security Practitioner study, only 3% recognize that a container, in and of itself, is not a security boundary, indicating that the default security capabilities of containers are overestimated. This result is especially alarming in conjunction with the fact that only 24% of respondents have plans in place to deploy the necessary building blocks for runtime security. “The results of the survey showcase a staggering knowledge gap that leads … More →
The post The knowledge gap around runtime security and the associated risks appeared first on Help Net Security.
NortonLifeLock’s global research team Norton Labs published its second quarterly Consumer Cyber Safety Pulse Report, detailing the top consumer cybersecurity insights and takeaways from April to June 2021. The analysis reveals the three most common phishing scams, in addition to new threats in encrypted chat marketplaces, online cookies, and vulnerable gaming drivers. Consumer cybersecurity insights: April to June 2021 Norton thwarted 23.7 million phishing attempts between April and June 2021, with tech support scams, survey … More →
The post Top consumer cybersecurity insights and takeaways from April to June 2021 appeared first on Help Net Security.
The global economy increasingly depends on data flowing freely across borders, yet the number of nations with regulatory barriers preventing that from happening has nearly doubled in four years—from 35 countries in 2017 to 62 now, according to a new report from the Information Technology and Innovation Foundation (ITIF). Together, those countries have implemented 144 measures that confine data within their borders—a concept known as “data localization”—up from 67 such barriers in 2017. Using econometric … More →
The post Data-localization policies are spreading rapidly around the world appeared first on Help Net Security.
As per the findings of a revised market research by Persistence Market Research, the worldwide quantum computing market insight reached a valuation of around $5.6 billion in 2020, and is anticipated to surge at a CAGR of 33.7% over the next ten years. Major companies are developing quantum computers focused on delivering free access to their quantum systems through cloud platforms, with the objective of creating awareness and a community for developers working on quantum … More →
The post Quantum computing market is anticipated to surge over the next decade appeared first on Help Net Security.
NortonLifeLock announced that the Norton Security Universal Windows Platform (UWP) app will be pre-installed on select new Lenovo laptop PCs. Expanding its collaboration of more than two decades, NortonLifeLock will help protect Lenovo’s always-on, always-connected laptops, including the Yoga 5G (known as Lenovo Flex 5G in the US), IdeaPad 5G and IdeaPad 4G LTE, bringing a trusted level of security to consumers. “We’re thrilled to expand our work with a forward-thinking brand like Lenovo that … More →
The post Norton Security UWP app helps protect Lenovo laptop PCs from hackers and online scams appeared first on Help Net Security.
Anexinet announced the company has partnered with Ping Identity. The partnership will combine Ping Identity’s centralized Identity Access Management (IAM) with Anexinet’s cybersecurity assessments to help customers secure their data through multi-factor authentication, single sign-on, access management, intelligent API security, directory, and data governance capabilities. Anexinet joins a growing list of solution providers, resellers, managed service providers (MSPs), and global systems integrators (GSIs) developing IAM solutions and services through the Ping Identity Global Channel Partner … More →
The post Anexinet partners with Ping Identity to improve cybersecurity offerings for customers appeared first on Help Net Security.
While it’s important to engage incident response during a cyber security incident, F-Secure Consulting’s global incident response offerings put equal emphasis on readiness as a strategy for mitigating the risk of cyber attacks. In the last 12 months, F-Secure Consulting responded to dozens of major security incidents for organizations across the globe. Ransomware attacks accounted for about a third of all engagements. Other cases included acts of nation-state level espionage, different financially-motivated attacks, and more. … More →
The post F-Secure’s incident response services help organizations contain and mitigate security incidents appeared first on Help Net Security.
As the 4th Industrial Revolution continues to accelerate business demand for high-speed broadband and presence in the cloud, Lumen Technologies has expanded its fiber network infrastructure in Europe, strengthening its service capabilities in France, Switzerland and Spain. These strategic network expansions put high-performance fiber closer to end users to deliver faster connections, lower latency and enhanced security, for an exceptional customer experience. The infrastructure extends fiber reach in and between major hubs of business and … More →
The post Lumen expands its fiber network in Europe to strengthen its service capabilities appeared first on Help Net Security.
Here’s an overview of some of last week’s most interesting news and articles: Kaseya obtains universal REvil decryptor There’s finally some good news for the MSPs and their customers that have been hit by the REvil ransomware gang via compromised Kaseya VSA software: a universal decryptor has made it available to affected organizations. DDoS attacks are up, with ever-greater network impact With an overall rise in available network capacity, cyber criminals are increasingly targeting their … More →
The post Week in review: HiveNightmare on Windows 10, Kaseya obtains REvil decryptor appeared first on Help Net Security.
S&I Corporation has released “atxpert (‘at’+’expert’) AI Viewer”, a new AI building security management system based on Microsoft Azure, TnM Tech’s Ghost-I AI edge computing and Scenera’s NICE PaaS, a managed Kubernetes service built on Microsoft Azure infrastructure. Combining these partners’ technologies enables a highly scalable and easy to manage building safety and security management system. The system can detect special events such as off-hour intrusion, tailgating at the entrance, fire, loitering and more. All … More →
The post S&I releases AI building security management system built on Microsoft Azure appeared first on Help Net Security.