Google Workspace opens up spaces for all users

Google is tying everything together with a handbook for navigating hybrid work, which includes best practice blueprints for five common hybrid meetings. Continue reading Google Workspace opens up spaces for all users

Box, Zoom chief product officers discuss how the changing workplace drove their latest collaboration

Their newest collaboration is the Box app for Zoom, a new type of in-product integration that allows users to bring apps into a Zoom meeting to provide the full Box experience. Continue reading Box, Zoom chief product officers discuss how the changing workplace drove their latest collaboration

Private network deployments are slow, the window of opportunity for enterprise 5G is closing

There are more than 290 fully publicly disclosed private network deployments worldwide, according to a research published by ABI Research. In China, the industry assumes there are several hundred private network deployments, but only 40 are fully publi… Continue reading Private network deployments are slow, the window of opportunity for enterprise 5G is closing

Electronic security market to reach $80 billion by 2027

The electronic security market size is anticipated to record a valuation of $80 billion by 2027, according to a study by Global Market Insights. The global market is poised to record commendable proceeds over the forthcoming years, owing to the increas… Continue reading Electronic security market to reach $80 billion by 2027

DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos

Following the discovery of Hafnium attacks targeting Microsoft Exchange vulnerabilities, the Cybereason Nocturnus and Incident Response teams proactively hunted for various threat actors trying to leverage similar techniques in-the-wild. In the… Continue reading DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos

Wyden bill would require digital signatures for sensitive court orders

Miscreants have leveraged counterfeit court documents to authorize wiretaps on romantic interests or dupe Google into removing embarrassing links from search results, among other instances of fraud, in recent years. Sen. Ron Wyden on Wednesday is unveiling bipartisan legislation to counter that kind of forgery by requiring federal, state and tribal courts to use digital signatures — which rely on encryption technology — for orders that authorize surveillance, domain seizures and online content removal. The legislation, first reported by CyberScoop, also directs the National Institute for Standards and Technology to develop standards for court order digital signatures within two years, for federal courts to test out the technology and then for state and tribal courts to adopt it within four years after the rules are finished. The senator said the bill aims to curb opportunities for fraud by forcing the use of digital signatures, which are rapidly surging in popularity. […]

The post Wyden bill would require digital signatures for sensitive court orders appeared first on CyberScoop.

Continue reading Wyden bill would require digital signatures for sensitive court orders

Lightyear nabs $13M Series A as online network procurement takes shape

It seems like everything is being pushed online now, but network procurement stubbornly has remained an in-person or phone-based negotiation. Lightyear, an early stage New York City startup decided to change that last year, and the company announced a $13.1 million Series A today. The round was led by Ridge Ventures with participation from Zigg […] Continue reading Lightyear nabs $13M Series A as online network procurement takes shape

LaLisha Hurt – Deputy CISO, General Dynamics Information Technology

​ Passion for growing cyber talent, risk-based transformative decision making and alignment to business outcomes as well as customer mission are three traits successful Chief Information Security Officers (CISO) must possess.  LaLisha Hurt embodies these traits and over the course of her varied career, she has held progressive roles as a regulatory examiner, auditor, consultant,…

The post LaLisha Hurt – Deputy CISO, General Dynamics Information Technology appeared first on SecurityCurrent.

Continue reading LaLisha Hurt – Deputy CISO, General Dynamics Information Technology

Suspected Chinese hackers target telecom research in Taiwan, Recorded Future says

A suspected Chinese state-sponsored group is targeting telecommunications organizations in Taiwan, Nepal and the Philippines, researchers at Recorded Future’s Insikt Group said in a report Thursday. Researchers noticed intrusions from the group, which investigators called TAG-22, in June targeting telecommunications organizations including the Industrial Technology Research Institute in Taiwan, Nepal Telecom and the Department of Information and Communications Technology in the Philippines. Some of the activity appears to be ongoing as of press time, researchers said. The new findings play into a larger backdrop of apparent Chinese hackers snooping on global competition in the telecommunications space, which has become an arena of political and economic conflict between China and the United States. “In particular, the targeting of the ITRI is notable due to its role as a technology research and development institution that has set up and incubated multiple Taiwanese technology firms,” researchers wrote. They noted that the organization is […]

The post Suspected Chinese hackers target telecom research in Taiwan, Recorded Future says appeared first on CyberScoop.

Continue reading Suspected Chinese hackers target telecom research in Taiwan, Recorded Future says