Security

Microsoft wants to work with Trump as it did with Obama on Cybersecurity

Microsoft, the American Multinational Technological company has taken a vow to work with US President Donald Trump as it did with Barack Obama previously on Cybersecurity. The company’s main objective behind this initiative is to protect US citizens from Cyberthreats of all range coming from hackers, groups, and adversaries. The decision was announced by Microsoft […]

Safest websites when it comes to Cyber Security

Dashlane, a New York-based mobile security provider conducted a survey recently and came to a conclusion that most of the popular websites are not well equipped when it comes to protecting their customer’s critical data with two-factor authentication. Note 1- 2FA or 2 Factor Authentication adds an extra layer of security protection to a service […]

IAEA offers training to protect Nuclear Facilities from prevailing Cyber Threats

The International Atomic Energy Agency (IAEA) announced a training program designed to protect Nuclear Facilities from the growing threat of Cyber Attacks. The program which was started in October this year has so far managed to attract the attention of 37 government endorsed participants from 13 countries. Note- IAEA which is based in Austria is […]

Dell EMC release ‘Cyber Attack’ protection software for Data Centers

Dell EMC has announced new ‘Cyber Attack’ Protection software for data centers. And the solution is said to offer an automated means for isolating and recover critical data as soon as an attack incident impacts a server network. This includes protection from ransomware and other destructive cyber threats. Dubbed as ‘Cyber Recovery’ the new software […]

American Cybersecurity Conference on British Warship

HMS Queen Elizabeth, a £3.1 billion worth warship is all set to host a conference on cybersecurity when it arrives in New York City this week. According to the sources reporting to Cybersecurity Insiders the biggest aircraft carrier of UK dubbed as ‘Big Lizzie’ is already in the waters of “Big Apple” and will be […]

Israeli Cybersecurity startup Sygnia acquired by Temasek for $250 million

Sygnia, an Israeli based cybersecurity startup will soon be acquired by Singaporean firm Temasek for $250 million and the news was confirmed by a spokesperson from Temasek which happens to one of the world’s biggest investors. The latter’s plan is to beef up its cybersecurity business by capturing the market of the former which is […]

Google to block G-Drive Cloud backups from Android Pie for Security reasons

Google has announced that it will block automated cloud backups to Google Drive (G-Drive) from Smart Phones which operate on its upcoming Android Pie (P) version. The company also added in its statement that it will no longer be able to read user data stored on its cloud servers by its Android P users. The […]

Google to offer Titan Security into its Mobile Chips

To all users who aim to buy a Google Pixel 3 phone in near future, here comes happy news from the Web Search Giant ‘Google’. The Mountain View Company has announced yesterday at the hardware reveal event that all its Pixel phones coming in future will have the potential to integrate Titan Security into the […]

Bitglass Security Spotlight: Veeam, Mongo Lock, & Password Theft

This post was originally published here by Jacob Serpa. Here are the top cybersecurity stories of recent weeks:  440 million email addresses exposed by Veeam Unprotected MongoDB databases being targeted 42 million emails, passwords, and more leaked Cold-boot attacks steal passwords and encryption keys 2 billion devices still vulnerable to Bluetooth attack 440 million email […]

Security Best Practices for AWS CloudTrail

This post was originally published here by Edward Smith. AWS CloudTrail captures a log of all API calls for an AWS account and its services. It also enables continuous monitoring and post-incident forensic investigations of AWS by providing an audit trail of all activities across your AWS infrastructure. What’s the risk if CloudTrial is misconfigured? […]

Share this page