Sicherheitsinfos

securitymagazine.comThough a robust and flexible user interface, security end users can manage and administer enterprise security solutions up to 30-percent faster with the CompleteView 20/20 Video Management Solution from Salient....

securitymagazine.comThe National Institute of Standards and Technology (NIST) invites comments on Draft NISTIR 8196, Security Analysis of First Responder Mobile and Wearable Devices, a document that reviews the current and potential use cases of mobile and wearable devices by first responders and analyzes them from a cybersecurity perspective....

securitymagazine.comThe NYPD announced its Unmanned Aircraft System (UAS) program, which will be comprised of newly acquired Unmanned Aerial Vehicles (UAV), or drones, and the licensed NYPD officers of the Technical Assistance Response Unit (TARU) who will operate them....

securitymagazine.comThe Transportation Security Administration released its Cybersecurity Roadmap, which will guide efforts to prioritize cybersecurity measures within TSA and across the transportation systems sector....

securitymagazine.comAccording to the 2018 Global Terrorism Index (GTI), deaths from terrorism fell for the third consecutive year, after peaking in 2014. ...

securitymagazine.comBy 2022, more IP traffic will cross global networks than in all prior “Internet years” combined up to the end of 2016, according to Cisco’s Complete VNI Forecast. In other words, more traffic will be created in 2022 than in the first 32 years of the Internet....

securitymagazine.comAfter years of breaches, stolen data, CIO/CISO resignations and huge impacts to business reputation, it’s time for the industry to rethink its approach to network security....

securitymagazine.comThe cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI)....

securitymagazine.comFor all the hundreds of firewall rules and network protocols that your security staff may put in place to better safeguard your network, sometimes there’s simply no accounting for the most unpredictable variable of them all: human behavior. Whether it be through social engineering techniques, bad actors within your own organization, or simple human error, hackers around the world are trained on how to take advantage of a company’s employees and staff in order to gain access to a protected network....

securitymagazine.comWith the barrage of information coming into a system, separating the noise from the genuine threats can be a difficult process. This is where AI can come in, to help you separate the real risks to your business from normal network noise....

securitymagazine.comAirbnb has released a new report detailing business travel trends which have been on the rise in 2018, and are set to continue in 2019....

securitymagazine.comAfter a tragic industry accident took the lives of 11 employees, Jacobs Engineering Group decided to completely reinvent their duty of care culture, which now protects 77,000 employees at home and abroad by providing tailored education, preparedness and awareness programs....

threatpost.comHackers can steal data, sabotage cloud deployments and more....

threatpost.comAdobe issued a patch for the zero-day on Wednesday....

threatpost.comThe facial recognition pilot will identify “subjects of interest" around the White House....

threatpost.comThe company allegedly tried to hide away new policy changes that would collect Android app users' call and message logs....

threatpost.comResearchers identified a widespread campaign of brute force attacks against WordPress websites....

threatpost.comMicrosoft and the AI Now Institute are both calling for regulation as facial recognition software picks up popularity....

threatpost.comInfosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in today's security landscape....

threatpost.comThreat group moves away from “smash-and-grab” attacks and adopts a boutique approach to targeting victims....

threatpost.comA newly-passed Australian law could allow the government to force tech companies to create backdoors in their products....

threatpost.comWatch out for emails about gift cards and corporate donations, researcher warn....