Finding a Better Route to Router and Home Network Security

Credit to Author: Trend Micro| Date: Wed, 04 Sep 2019 14:05:00 +0000

When was the last time you looked at your home router? We tend to only notice these magical boxes when something goes wrong. And given that many of us get our router as part of a single broadband box (technically known as a gateway, combining modem and router in one device), there’s even less incentive…

The post Finding a Better Route to Router and Home Network Security appeared first on .

Read more

With 1.4 Billion Stolen Log-Ins on the Dark Web, it’s Time to Take Password Management Seriously

Credit to Author: Michael Miley| Date: Tue, 19 Dec 2017 14:58:08 +0000

Today, we'll take a deep dive into passwords, including what vulnerabilities weak passwords can open up and how to improve authentication security.Last week you may have seen some worrying news: researchers probing the darkest corners of the underground web found a secret trove containing 1.4 billion breached usernames and passwords. Yes, that’s right: 1.4 BILLION. Yours might very well be among them, and if you reuse the same password across numerous accounts, they may all now…

Read more

Improving Vehicle Security

Credit to Author: Jon Clay| Date: Thu, 30 Nov 2017 13:00:31 +0000

We have been investing in IoT Security for many years now, both in researching many of the challenges we’re seeing within IoT infrastructure and device security, to developing solutions that protect against threats targeting IoT and IIoT devices. Today we announced an alliance with Mentor that looks to improve the security of connected vehicles by…

Read more

Here’s Why You Should Consider A Career In Cybersecurity

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 25 Oct 2017 19:06:21 +0000

Cybersecurity team working together at a computer workstationThe need for more technologists with cybersecurity skills is undeniable. That may be an awkward way to phrase it, but it’s a better representation that “cybersecurity professionals.” In today’s world, everyone who works on and with technology needs to be aware of cybersecurity challenges. This week as part of National Cyber Security Awareness Month (NCSAM),…

Read more

Today’s Predictions for Tomorrow’s Internet

Credit to Author: Rik Ferguson (VP, Security Research)| Date: Thu, 19 Oct 2017 13:00:36 +0000

Making predictions is a tricky business and in no area more so than in the area of rapidly developing technology. The pace of change continues to accelerate and the nature of innovation is such that entrepreneurs, as well as criminals are continually searching for “the next big thing” to either benefit or to blight our…

Read more

Cyber Insurance Rates to Rise – What Should I Do?

Credit to Author: William “Bill” Malik| Date: Mon, 24 Jul 2017 13:00:01 +0000

Organizations manage risk in three ways: they accept it, they take out insurance against it, or they take active measures to diminish its potential impact. These active measures commonly include deploying or enhancing (or removing) technology, updating policies and procedures, instituting training and awareness programs, revising their third-party agreements, and in some cases, modifying their…

Read more