A Swiss national who recently highlighted flaws in Verkada surveillance cameras has been charged with criminal hacking by a U.S. federal grand jury and accused of illegally accessing and leaking data from numerous organizations, apparently including Intel, Nissan and the U.S. National Reconnaissance Office.
Two vulnerabilities in Tesla's keyless entry system allowed researchers to clone a key fob and drive away with a Model X. The electric vehicle manufacturer is issuing over-the-air updates to fix the flaws, which allegedly center on a failure to validate firmware updates and a faulty Bluetooth pairing protocol.
Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
Britain's failure to contain COVID-19 - despite Prime Minister Boris Johnson promising a "world-beating" effort - now includes a failed digital contact-tracing app. A new version, built to work with Apple and Google APIs, may be released by winter. Really, what's the rush?
As phishing campaigns and hacker attacks spread during the COVID-19 global pandemic, it's more important than ever for organizations to promptly report fraud to authorities to help them crack down on cybercrime, says Dr. Karnika Seth cyberlaw expert and advocate at Supreme Court of India.
Device visibility remains a daunting challenge for the modern enterprise. Forescout provides a multifaceted information technology (IT) and operational technology (OT) platform designed to solve visibility challenges for the modern enterprise by providing complete device discovery and classification, risk assessment,...
Operational technology (OT) cybersecurity stakeholders and ICS asset owners may have blind spots within their operation that a completely passive ICS cybersecurity solution cannot solve. Incomplete asset information and device visibility resulting from dormant and legacy ICS devices can leave networks exposed to...
In None We Trust
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers, and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to...
Connected IoT devices are expected to reach more than 75 billion by 2025. Because of that, reducing cyber risk is increasingly becoming a critical focal point for network and security professionals.
Download the IoT eBook to learn more about:
The new risks posed by consumer-grade IoT devices
"Zero Trust" security is rapidly transitioning from a marketing buzzword to a practical methodology for protecting today's global networks. Stan Lowe, global CISO of Zscaler, shares his 2020 vision for zero trust.
Delayed enforcement of the "strong customer authentication" requirements for online transactions under the European Union's PSD2 regulation is hampering efforts to enhance security. That's why the European Banking Authority should act quickly to develop a new timeline.
The Reserve Bank of India is proposing that financial technology firms be allowed to test new products and services that might require the relaxation of certain compliance regulations in what's called a "regulatory sandbox" approach.
Currently, nearly ninety percent of organizations worldwide are using
Active Directory (AD) for on-premises
resources (aka on-prem). That
represents 500 million organizations
and somewhere around 10 billion daily
authentications. In fact, in the world
of identity and access management
(IAM), AD has become...