Digital Habits During Pandemic Have Lasting Impact

The unexpected global pandemic left the world scrambling to maintain their daily activities and work as best they could. With stay-at-home orders that lasted for months on end—and some countries currently instituting another wave of lockdowns—most peo… Continue reading Digital Habits During Pandemic Have Lasting Impact

What the Van Buren Case Means For Security Researchers

The federal computer crime law prohibits “computer trespass.” This includes both “accessing” a computer without authorization, and “exceeding the scope of authorization” to access a computer. If these terms seem vague and ambiguous to you, well,… Continue reading What the Van Buren Case Means For Security Researchers

China ‘Eugenics’ Claim as BGI Hoards Prenatal Test DNA Data

Chinese genetics company BGI accused of misusing DNA harvested from prenatal testing.
The post China ‘Eugenics’ Claim as BGI Hoards Prenatal Test DNA Data appeared first on Security Boulevard.
Continue reading China ‘Eugenics’ Claim as BGI Hoards Prenatal Test DNA Data

3 tips for balancing data security and usability

Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and upholding the proper security of that data. The truth is, for most employees, securi… Continue reading 3 tips for balancing data security and usability

Remote Work Brings User Complaints and High IT Costs

A recent “Work From Anywhere” survey commissioned by Cato Networks revealed that IT has encountered many unexpected challenges supporting and securing remote users in the wake of the COVID-19 pandemic. The survey, which queried some 2,686 IT leaders, … Continue reading Remote Work Brings User Complaints and High IT Costs

4 Ways to Improve Governance in Product Security

Security is all about closing gaps—between attacker tactics and your defensive capabilities, for instance, or the known and unknown user identities in your cloud infrastructure. An important gap that too many organizations overlook actually starts at … Continue reading 4 Ways to Improve Governance in Product Security

Remote Workforce Monitoring Brings Up Privacy Concerns

The pandemic paved the way for expanded remote work possibilities, but companies looking to ensure employees remain on the job while at home have led some to consider technologies to digitally monitor worker activity, in some cases through AI. Those i… Continue reading Remote Workforce Monitoring Brings Up Privacy Concerns

Critical infrastructure cyberattacks signaling the importance of prioritizing security

Armis released new data uncovering the lack of knowledge and general awareness of major cyberattacks on critical infrastructure and an understanding of security hygiene. The survey of over 2,000 respondents from across the United States found that end … Continue reading Critical infrastructure cyberattacks signaling the importance of prioritizing security

What are the most common cybersecurity challenges SMEs face today?

Small and medium-sized enterprises (SMEs) are considered to be the backbone of Europe’s economy. 25 million SMEs are active in the EU, and employ more than 100 million workers. ENISA identified the cybersecurity challenges SMEs face today and iss… Continue reading What are the most common cybersecurity challenges SMEs face today?

REvil Makes Monkeys out of Kaseya Customers

Over the long weekend, a huge ransomware attack emerged. Kaseya seems to have been the common component.
The post REvil Makes Monkeys out of Kaseya Customers appeared first on Security Boulevard.
Continue reading REvil Makes Monkeys out of Kaseya Customers