Researchers Find New Chunk of SolarWinds Attackers’ infrastructure
MAY 4, 2021
MAY 4, 2021
DECEMBER 28, 2020
Elevate Security, the first human risk management platform of its kind, released the “Global Employee Risk Insights Report.” This groundbreaking research is the industry’s first global research report on employee […]. News Elevate Elevate Security
MARCH 24, 2021
Elevate Security has produced a first-of-its-kind analysis of more than 1.5 million anonymized employees’ security decisions. This groundbreaking research is the industry’s first global research report on employee security decisions […].
OCTOBER 5, 2016
The security threat posed by IoT devices is not hype, says security researcher James Lyne
Speaker: Mark Ridley, Owner and Founder, Ridley Industries
Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.
JANUARY 26, 2021
Security researchers are some of the unsung heroes within the cybersecurity field. How is North Korea targeting security researchers? The North Korea based threat actors are using a number of different strategies to target security researchers.
SEPTEMBER 2, 2020
Google Cloud will provide AI for cancer diagnosis research and augmented reality microscopes to Veterans Affairs hospitals as part of a new contract.
JULY 13, 2017
Encryption keys are not as random as most people think, which means encrypting data is often not as secure as it could be, according to security researchers
JULY 13, 2020
Typically, you can distinguish between a cybercriminal and a security researcher. Now, a group of security researchers are begging the Supreme Court to change that. What are security researchers asking the Supreme Court? Security Research Original Content
DECEMBER 30, 2020
Security researchers looking to get under the hood of technology in order to improve it received a pleasant victory on Tuesday when a federal judge in Florida decided to throw out Apple’s copyright violation claims against the maker of virtual iPhone software.
DECEMBER 23, 2020
Apple is finally making good on its promise to seed hacker-friendly iPhones to those participating in its Security Research Device (SRD) program
NOVEMBER 9, 2016
Five-year research collaboration agreement will support government efforts to address cyber security challenges
MAY 4, 2017
Building an effective testing process across all elements associated with a product is key to securing the internet of things, according to a researcher in the field
APRIL 4, 2021
As cybersecurity and regulatory compliance become the top two biggest concerns of corporate boards, some are adding cybersecurity experts specifically to scrutinize security and risk issues. The reality of security today is that security leaders have too many tools. IT Security
DECEMBER 8, 2016
Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers
AUGUST 13, 2020
Researchers at security firm Check Point uncovered a flaw that could have allowed attackers to extract personal information from Alexa accounts.
APRIL 10, 2021
A pair of security researchers revealed several zero-day vulnerabilities in Zoom in recent days that would have let hackers take over someone’s computer even if the victim hadn’t clicked anything.
APRIL 30, 2021
There is a hidden market for privacy, with consumers eager to pay a premium to protect their personal information online, new research shows. Cloud Enterprise Marketing Security category-/Business & Industrial consumer privacy reports
MARCH 26, 2021
A Capgemini and Forrester study showed how cyber-resilience is essential to defining a data-centric security roadmap and managing cyber risk. Enterprise Security VB Home Page Capgemini category-/Computers & Electronics/Computer Security data security Forrester Research risk management
MAY 24, 2014
Bernstein Research, an equ. CTO Cyber Security DoD and IC Government Research Tech Trends Comcast Federal Communications Commission Google Google Fiber Internet service provider Net neutrality Sanford Bernstein Wall Street Storm clouds of litigation threats and federal regulations have darkened the beginning of May for some techies. Will Thom Wheeler and the FCC continue to promote the “fast lane” idea?
JULY 23, 2020
Apple invited security researchers to apply to receive modified iPhones designed to help them hunt for flaws in the company’s mobile operating system.
JUNE 30, 2020
Tech giants joined universities and nonprofits and backed a national AI research cloud, something supporters say will help the U.S. innovate and compete. Read More.
APRIL 23, 2021
Apple’s AirDrop feature is a convenient way to share files between the company’s devices, but security researchers from Technische Universitat Darmstadt in Germany are warning that you might be sharing way more than just a file.
AUGUST 4, 2020
Business Dev Enterprise Entrepreneur Security Bug Bounty bug bounty program category-/Computers & Electronics/Computer Security Microsoft Microsoft Security Response CenterMicrosoft today announced it has paid out $13.7
MAY 29, 2015
The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8
MAY 23, 2016
Below, I've highlighted some of our most recent and exciting GRC research: Read more Categories: Brand Risk. security and risk. Brand Risk Crisis Management Customer Risk Disaster recovery Enterprise Risk Management Governance Risk and Compliance Information Risk Reputational Risk Security and Risk security and riskCrises don't discriminate. Whether they are economic, geopolitical, technological or environmental, you can expect to have to deal with a major one soon.
OCTOBER 6, 2016
A security researcher who has exposed a series of vulnerabilities in IoT devices says he is concerned about systemic attacks that could take down parts of the internet or national power grids
MARCH 30, 2015
The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. By Charles Hall.
FEBRUARY 26, 2021
A security researcher is recommending against LastPass password manager after detailing seven trackers found in the Android app, The Register reports. Image: LastPass.
OCTOBER 10, 2019
Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”
JUNE 30, 2020
A major security exploit in current versions of macOS allows malicious actors to clone Safari and use it to share private files, breaking Apple's security.
JULY 6, 2020
Researchers developed a device called LeakyPick that monitors network traffic to determine when smart devices might be recording audio. AI Big Data Cloud Dev Security ai artificial intelligence LeakyPick machine learning research speech recognition voice assistants
JANUARY 26, 2021
According to Google's Threat Analysis Group, state-sponsored North Korean hackers are targeting security researchers via social engineering. Writing in a blog post, the group says that the campaign specifically targeted researchers working on vulnerability research and development.
JUNE 12, 2020
Researchers propose a framework -- SECure -- designed to measure the social and environmental impact of AI systems in the real world. Read More.
JUNE 6, 2017
Researchers from the University of Michigan and Stony Brook University published a paper explaining a novel approach to IoT security challenges (pdf). The researchers pose the question: “What are the new intellectual challenges in the science of security when we talk about the Internet of Things, and what problems can we solve using currently known security techniques?”.
DECEMBER 5, 2017
Security researchers have identified a new strain of support scam malware and a way of clearing up infected machines
JANUARY 22, 2021
Facebook, New York University, and Stanford researchers propose Porcupine, a program that encrypts code with high efficiency. Read More.
APRIL 9, 2021
Microsoft released CyberBattleSim, an open-source toolkit to let researchers create attack simulations and use AI to develop network defenses. Read More.
AUGUST 28, 2020
AI Big Data Business Dev Enterprise Media Mobile Security Social artificial intelligence ECCV European Conference on Computer Vision Flickr machine learning MIT natural disasters Qatar Computing Research Institute Twitter Universitat Oberta de Catalunya
SEPTEMBER 15, 2016
While awareness of cyber security risks is improving, fewer firms know how much an attack is likely to cost them
AUGUST 24, 2017
Malware targeting the Mac operating system has seen a significant growth in the first half of this hear, according to security firm Malwarebytes
OCTOBER 29, 2016
Research Team. Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production.
JULY 13, 2020
Security researcher and pen tester Vinny Troia learned that over the weekend. Night Lion Security, DataViper hakced as revenge. Troia runs Night Lion Security and a related service called Data Viper. Security researcher says hackers accessed a test environment.