Google Buckles Down on Android Enterprise Security

Google today launched the Android Enterprise Vulnerability Rewards Program, its latest effort to boost Android Enterprise security, along with several new capabilities and tools in Android 12. Android 12, which is now available for Pixel phones and will be available for other devices later this year, brings more default enterprise

0 Comments

Microsoft bought CloudKnox because hybrid multicloud identity is complicated

Managing passwords and privileged access is bad enough for people—but that’s going to be dwarfed by the problem of dealing with non-human identities. Image: Shutterstock/sitthiphong How many cloud services, APIs, virtual machines and containers is your organization using? Whatever number you just thought of, you should probably double it—or add

0 Comments

Cybersecurity careers: What to know and how to get started

Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track. How do you start a career in cybersecurity? What qualifications, certifications and skills do you

0 Comments

How to digitally sign email in Apple Mail

Adding a digital signature to your email is just one simple step you can take in your journey for more secure communications. Jack Wallen shows you how this is done in the latest version of Apple Mail. Image: GettyImages/Westend61 More about Apple Digitally signing an email might not be a

0 Comments

Before and After a Pen Test: Steps to Get Through It

An effective cybersecurity strategy can be challenging to implement correctly and often involves many layers of security. Part of a robust security strategy involves performing what is known as a penetration test (pen test). The penetration test helps to discover vulnerabilities and weaknesses in your security defenses before the bad

0 Comments

How to keep your data off the Dark Web

Traditional security solutions are no longer enough to protect your organization from a data breach, Bitglass says. Image: wildpixel, Getty Images/iStockphoto Data is a hot commodity on the Dark Web where people buy and sell sensitive information, much of it stolen through network breaches. Usernames, passwords, account numbers, financial records,

0 Comments

Microsoft-Signed Rootkit Targets Gaming Environments in China

Researchers have identified a rootkit with a valid digital signature from Microsoft being distributed within gaming environments in China. The rootkit, called FiveSys, is being used to redirect traffic to an attacker-controlled custom proxy server and is likely operated by a threat actor with significant interest in China’s gaming market,

0 Comments

How to proactively detect and prevent ransomware attacks

Two out of three organizations surveyed by ThycoticCentrify were hit by a ransomware attack over the past 12 months, and more than 80% reportedly opted to pay the ransom. Image: Getty Images/iStockphoto The key to combating any type of cyberattack is to prevent it before it happens, or at least

0 Comments

Optiv Announces Second Annual $40,000 Scholarship for Black, African American Identifying STEM Students

DENVER–(BUSINESS WIRE)–Optiv Security, a security solutions integrator delivering end-to-end cybersecurity solutions, today announced its Black Employee Network will be offering $40,000 over four years in scholarship funds. The scholarship will be awarded to an individual who identifies as Black and/or African American and is studying a STEM (science, technology, engineering

0 Comments

Brave browser replaces Google with its own search engine

Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon Brave, the company most widely known for its eponymous privacy-focused browser, has announced that it will replace Google and other search engines with its own

0 Comments