Security

Google manages Mobile Security at its workplace with Tiered Access

For all those who wonder how Google manages Mobile security in its work environments, here’s a quick update. Google Technical Infrastructure division has recently announced to the world that it is offering utmost mobile security to more than 61,000 of its employees with a tiered access security model that categorizes corporate services and devices into […]

Mobile Security breach makes Healthcare provider shell out $2.5 million penalty!

The Office of Civil Rights (OCR) has directed Pennsylvania-based wireless health services provider CardioNet to pay $2.5 million penalties for being negligent towards protecting patient data. Thus, the penalty of OCR- HIPAA Settlement’s happens to be the first of its kind in the history of wireless health service providers. On heading further into details, CardioNet […]

Lacework unveils ‘Polygraph’ Cloud Security Solution

Lacework, Inc. a Mountain View, California-based Cloud Security provider has recently unveiled a Zero Touch solution named ‘Polygraph’ which helps in providing a graphical interface for breach detection and threat management on Public, Private and Hybrid Cloud Networks. Thus, Polygraph helps IT managers, CIOs and CTOs in detecting a breach in time and helps in […]

Five Mobile Security concerns which are usually ignored

In the world of Mobile Security, CIOs, CTOs and IT managers are often worried on how to protect the mobile devices and the networks they connect to, from threats and vulnerabilities associated with mobile computing. Cementing the concern is a recent Dell survey which suggests that almost three-quarters of employees are willing to share critical […]

Cybersecurity Startup Tanium uses sensitive customer data in its Marketing Demos

End Point Security and Systems Management Company Tanium has been accused by El Camino Hospital for using its sensitive patient data in demos meant to impress prospective clients. The Wall Street Journal latest revelation alleges that the security startup used the customer data without permission in all its demos meant for promotion between 2010-2015. A […]

AWS services misconfiguration exposes users to risks related to Cloud Security!

Security Vendor Threat Stack has conducted a recent study on the usage patterns of AWS users and found that 73% had some form of misconfiguration that could expose them to potential security risks. The security vendor is all set to present the study at the Amazon Web Services Summit and is said to expose more […]

Mobile Security feature of Google ‘O’ to end Ransomware menace

Google’s upcoming mobile operating system titled ‘Android O’ is said to end ransomware menace on its user phones once and forever. The new operating system will have up to date mobile security features having the ability to block attacks from ransomware. It’s a known fact that Google has recently intensified the campaign against malware attacks […]

Fortinet extends support to strengthen Cloud Security in Corporate World

Cyber security software developing vendor Fortinet has announced that it is extending its support to strengthen cloud security feature in the corporate world. The American company announced in this week that it is going to achieve its objective by adding a Cloud Security Access Broker (CASB) to its product portfolio. Cloud Security is now on […]

Research says Robots are vulnerable to Cyber Attacks

According to the researchers of IOActive, robotic devices which are flooding the IoT market are extremely vulnerable to cyber attacks. In an introductory paper “Hacking Robots before Skynet”, researchers confirmed that connected robotic devices are facing cybersecurity risks such as authentication and privacy. With regards to the rapid proliferation of robotic devices, the researchers are […]

Here’s the list of the top Cloud Security Certifications for IT Professionals

Planning to make Cloud Security as your career? Then here’s the list of top cloud security certifications for IT professionals. CISSP Certification- This certification has been around for years and looks evergreen on the professional front. Certified Information Systems Security Professional certification has nowadays included new cloud-specific attacks, such as man-in-the cloud attacks. Some certification […]

Share this page