Researchers Find New Chunk of SolarWinds Attackers’ infrastructure

CTOvision

Elevate Security Unveils New Research Shedding Light on Characteristics of Employees Most and Least Likely to Cause the Next Security Incident

CTOvision

Elevate Security, the first human risk management platform of its kind, released the “Global Employee Risk Insights Report.” This groundbreaking research is the industry’s first global research report on employee […]. News Elevate Elevate Security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Elevate Security Produces Global Employee Risk Insights Report

CTOvision

Elevate Security has produced a first-of-its-kind analysis of more than 1.5 million anonymized employees’ security decisions. This groundbreaking research is the industry’s first global research report on employee security decisions […].

Report 240

IoT security threat is real, says researcher

Computer Weekly

The security threat posed by IoT devices is not hype, says security researcher James Lyne

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

4 Ways North Korea Is Targeting Security Researchers

SecureWorld News

Security researchers are some of the unsung heroes within the cybersecurity field. How is North Korea targeting security researchers? The North Korea based threat actors are using a number of different strategies to target security researchers.

Google Cloud secures U.S. military AI cancer research contract

Venture Beast

Google Cloud will provide AI for cancer diagnosis research and augmented reality microscopes to Veterans Affairs hospitals as part of a new contract.

Encryption keys too predictable, warn security researchers

Computer Weekly

Encryption keys are not as random as most people think, which means encrypting data is often not as secure as it could be, according to security researchers

Security Researchers Ask U.S. Supreme Court to Protect Them

SecureWorld News

Typically, you can distinguish between a cybercriminal and a security researcher. Now, a group of security researchers are begging the Supreme Court to change that. What are security researchers asking the Supreme Court? Security Research Original Content

Judge Tosses Apple Lawsuit Against iPhone Emulator in Big Victory for Security Research

GizModo VR

Security researchers looking to get under the hood of technology in order to improve it received a pleasant victory on Tuesday when a federal judge in Florida decided to throw out Apple’s copyright violation claims against the maker of virtual iPhone software.

Apple is sending hacker-friendly iPhones to security researchers

TechSpot

Apple is finally making good on its promise to seed hacker-friendly iPhones to those participating in its Security Research Device (SRD) program

HP sponsors cyber security research chair at Birmingham University

Computer Weekly

Five-year research collaboration agreement will support government efforts to address cyber security challenges

HP 196

Testing is key to IoT security, says researcher

Computer Weekly

Building an effective testing process across all elements associated with a product is key to securing the internet of things, according to a researcher in the field

Gartner Top Security and Risk Trends for 2021

CEB IT

As cybersecurity and regulatory compliance become the top two biggest concerns of corporate boards, some are adding cybersecurity experts specifically to scrutinize security and risk issues. The reality of security today is that security leaders have too many tools. IT Security

Trends 261

PowerShell security threats greater than ever, researchers warn

Computer Weekly

Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers

Check Point researchers uncovered Alexa flaw that exposed personal information and speech histories

Venture Beast

Researchers at security firm Check Point uncovered a flaw that could have allowed attackers to extract personal information from Alexa accounts.

Security Researchers Find Zoom Vulnerabilities That Would Have Let Bad Actors Take Over Your Computer

GizModo VR

A pair of security researchers revealed several zero-day vulnerabilities in Zoom in recent days that would have let hackers take over someone’s computer even if the victim hadn’t clicked anything.

Research: A market where consumers can pay for privacy is emerging

Venture Beast

There is a hidden market for privacy, with consumers eager to pay a premium to protect their personal information online, new research shows. Cloud Enterprise Marketing Security category-/Business & Industrial consumer privacy reports

Data-centric security is key to resiliency, cyber risk report says

Venture Beast

A Capgemini and Forrester study showed how cyber-resilience is essential to defining a data-centric security roadmap and managing cyber risk. Enterprise Security VB Home Page Capgemini category-/Computers & Electronics/Computer Security data security Forrester Research risk management

Study 109

Researchers Say Google Fiber Has Nationwide Potential

CTOvision

Bernstein Research, an equ. CTO Cyber Security DoD and IC Government Research Tech Trends Comcast Federal Communications Commission Google Google Fiber Internet service provider Net neutrality Sanford Bernstein Wall Street Storm clouds of litigation threats and federal regulations have darkened the beginning of May for some techies. Will Thom Wheeler and the FCC continue to promote the “fast lane” idea?

Apple offers security researchers modified iPhones to find iOS flaws

Venture Beast

Apple invited security researchers to apply to receive modified iPhones designed to help them hunt for flaws in the company’s mobile operating system.

AWS, Google, and Mozilla back national AI research cloud bill in Congress

Venture Beast

Tech giants joined universities and nonprofits and backed a national AI research cloud, something supporters say will help the U.S. innovate and compete. Read More.

AirDrop Security Flaw Exposes 1.5 Billion Apple Devices, Researchers Say

GizModo VR

Apple’s AirDrop feature is a convenient way to share files between the company’s devices, but security researchers from Technische Universitat Darmstadt in Germany are warning that you might be sharing way more than just a file.

Microsoft has paid security researchers $13.7 million for bug bounties in 12 months

Venture Beast

Business Dev Enterprise Entrepreneur Security Bug Bounty bug bounty program category-/Computers & Electronics/Computer Security Microsoft Microsoft Security Response CenterMicrosoft today announced it has paid out $13.7

Virginia Announces Research Commercialization Awards

CTOvision

The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8

Forrester’s Security & Risk Research Spotlight - Governance, Risk And Compliance

Forrester IT

Below, I've highlighted some of our most recent and exciting GRC research: Read more Categories: Brand Risk. security and risk. Brand Risk Crisis Management Customer Risk Disaster recovery Enterprise Risk Management Governance Risk and Compliance Information Risk Reputational Risk Security and Risk security and riskCrises don't discriminate. Whether they are economic, geopolitical, technological or environmental, you can expect to have to deal with a major one soon.

Poor IoT security could take down power grid, warns researcher

Computer Weekly

A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. By Charles Hall.

Security researcher recommends against LastPass after detailing 7 trackers

The Verge

A security researcher is recommending against LastPass password manager after detailing seven trackers found in the Android app, The Register reports. Image: LastPass.

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Researcher reveals Mac privacy bug, blasts Apple for ‘security theater’

Venture Beast

A major security exploit in current versions of macOS allows malicious actors to clone Safari and use it to share private files, breaking Apple's security.

Researchers identify dozens of words that accidentally trigger Amazon Echo speakers

Venture Beast

Researchers developed a device called LeakyPick that monitors network traffic to determine when smart devices might be recording audio. AI Big Data Cloud Dev Security ai artificial intelligence LeakyPick machine learning research speech recognition voice assistants

Google warns of a North Korean social engineering campaign targeting security researchers

TechSpot

According to Google's Threat Analysis Group, state-sponsored North Korean hackers are targeting security researchers via social engineering. Writing in a blog post, the group says that the campaign specifically targeted researchers working on vulnerability research and development.

Researchers propose framework to measure AI’s social and environmental impact

Venture Beast

Researchers propose a framework -- SECure -- designed to measure the social and environmental impact of AI systems in the real world. Read More.

Researchers find gaps in IoT security

Network World

Researchers from the University of Michigan and Stony Brook University published a paper explaining a novel approach to IoT security challenges (pdf). The researchers pose the question: “What are the new intellectual challenges in the science of security when we talk about the Internet of Things, and what problems can we solve using currently known security techniques?”.

Researchers warn of new support scam malware

Computer Weekly

Security researchers have identified a new strain of support scam malware and a way of clearing up infected machines

Researchers propose Porcupine, a compiler for homomorphic encryption

Venture Beast

Facebook, New York University, and Stanford researchers propose Porcupine, a program that encrypts code with high efficiency. Read More.

Microsoft open sources tool to use AI in simulated attacks

Venture Beast

Microsoft released CyberBattleSim, an open-source toolkit to let researchers create attack simulations and use AI to develop network defenses. Read More.

Researchers built a data set for training AI to detect natural disasters from social media images

Venture Beast

AI Big Data Business Dev Enterprise Media Mobile Security Social artificial intelligence ECCV European Conference on Computer Vision Flickr machine learning MIT natural disasters Qatar Computing Research Institute Twitter Universitat Oberta de Catalunya

Cyber security awareness growing within business sector, research shows

Computer Weekly

While awareness of cyber security risks is improving, fewer firms know how much an attack is likely to cost them

Mac malware continuing to escalate, warn security researchers

Computer Weekly

Malware targeting the Mac operating system has seen a significant growth in the first half of this hear, according to security firm Malwarebytes

Contrast Security

CTOvision

Research Team. Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production.

Revenge Hack Against a Security Researcher

SecureWorld News

Security researcher and pen tester Vinny Troia learned that over the weekend. Night Lion Security, DataViper hakced as revenge. Troia runs Night Lion Security and a related service called Data Viper. Security researcher says hackers accessed a test environment.