Top

Tag: Tech


Network security

It’s Time to Infuse AI Into Your Endpoint Security Strategy

June 26, 2018

Via: Security Intelligence

Computing and cybersecurity aren’t changing — they’ve already changed. End users have transformed the way IT works, and this means the widely accepted definition of endpoints has morphed. End users want to be connected to everything, which means virtually everything […]


Hacker

Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

June 19, 2018

Via: Security Intelligence

Humans versus machines: Who’s the better hacker? The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI, and this influx suggests the answer is likely machine. With each innovation in technology comes the […]


Network security

3 Tips for Driving User Buy-in to Security Policies

June 18, 2018

Via: Dark Reading

Teaching users why it’s important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here’s how. IT usage and security policies can be an annoyance for employees who simply see them […]


Network security, Security, Tech

6 Security Investments You May Be Wasting

May 31, 2018

Via: Dark Reading

Security budgets are growing and so are security costs, with drivers coming from all sides: data breaches that are more frequent and more expensive to remediate; preventative technologies that are costly to buy and maintain; and talent that remains both […]


Mobile security, Network security

Lawmakers take aim at Chinese tech giants in defense bill

May 18, 2018

Via: The Hill

Lawmakers are trying to use the must-pass National Defense Authorization Act (NDAA) to take a hard-line stance against Chinese technology in U.S. markets. On Thursday, several lawmakers attempted to insert amendments into the fiscal 2018 NDAA aimed at keeping products […]


Network security, Security

3 Ways to Maximize Security and Minimize Business Challenges

April 30, 2018

Via: Dark Reading

The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change. While security professionals like to think that a “network is a network,” in truth, every network is bespoke […]


Privacy protection

Mozilla Tests DNS over HTTPS: Meets Some Privacy Pushback

March 26, 2018

Via: Threat Post

The Mozilla Foundation is testing a new mechanism for securing domain name server traffic that uses the encrypted HTTPS channel. It is an attempt to speed up the internet, reduce the threat of man-in-the-middle attacks and keep prying eyes from […]


Network security

GitHub Enforces Stronger Encryption

February 23, 2018

Via: Security Week

GitHub this week permanently disabled a series of weak cryptographic standards across its software development platform in an attempt to better protect users. As of Feb. 22, 2018, the TLSv1/TLSv1.1 standard is no longer used on HTTPS connections to GitHub. […]


Network security

Risky AI business: Navigating regulatory and legal dangers to come

February 19, 2018

Via: CIO

Artificial intelligence (AI) is cropping up everywhere in business, as organizations deploy the technology to gain insights into customers, markets and competitors, and to automate processes in almost every facet of operations. But AI presents a wide range of hidden […]


Privacy protection, Security, Tech

Blockchain Hardened devices: Can they restore privacy with security by design?

February 14, 2018

Via: We Live Security

Regardless of your favorite or most hated device due to security concerns, the technologists behind them and the software they use, should share a key concern: “Security by design (and by default)”. While a strong line of prose, Security by […]