© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

John Maynard, Adarma: “the competition for cyber talent is tough and it’s only getting harder”

The cyber threat landscape is constantly expanding with emerging threats that exploit the newest vulnerabilities. It’s becoming increasingly important for...
Read more about John Maynard, Adarma: “the competition for cyber talent is tough and it’s only getting harder”

Jérôme Ajdenbaum, IDEMIA: "biometrics is the only way to ensure that you are who you claim you are"

Nowadays, more and more people complete their daily tasks online. Consequently, with the world going digital at such a fast...
Read more about Jérôme Ajdenbaum, IDEMIA: "biometrics is the only way to ensure that you are who you claim you are"

Richard Baker, rSolutions: “if it sounds too good to be true, it probably is”

Cyber felons don’t discriminate – no matter the individual or the sector the company is in, anyone can fall victim...
Read more about Richard Baker, rSolutions: “if it sounds too good to be true, it probably is”

Joakim Thorén, Versasec: “you need to properly increase the security level for each part of the company”

Global unrest is a convenient time for cyber felons, yet a difficult one for enterprises. As the attack surface increases,...
Read more about Joakim Thorén, Versasec: “you need to properly increase the security level for each part of the company”

Pim Tuyls, Intrinsic ID: “digital security is the top priority now – the stakes are much higher than ever before”

The global unrest has caused an increase in various cyberattacks, urging companies to adopt a zero-trust environment. There are various...
Read more about Pim Tuyls, Intrinsic ID: “digital security is the top priority now – the stakes are much higher than ever before”

Be careful when you scan QR codes

1
A new wave of users utilizing QR codes grew as part of the various track and trace initiatives implemented around...
Read more about Be careful when you scan QR codes

Chinese ‘cyber spies’ Naikon are back, says report

In further evidence that China is consolidating its digital forces against the West, the hacker group Naikon has resurfaced in recent weeks, according to an investigation by cybersecurity analyst Cluster25.
Read more about Chinese ‘cyber spies’ Naikon are back, says report

Martin Laster, LABUSA: "companies should look at cybersecurity systems as strategies and tactics rather than products and services"

The pandemic has normalized remote working conditions and presented new opportunities for cybercriminals to attack companies and individuals alike. Now,...
Read more about Martin Laster, LABUSA: "companies should look at cybersecurity systems as strategies and tactics rather than products and services"

Pontus Maltborg, Omikai: “AI intuition will take out a lot of manual labor-intense workarounds”

AI automation is taking over, exciting some with the chance to outsource tough manual work to the machine and scaring...
Read more about Pontus Maltborg, Omikai: “AI intuition will take out a lot of manual labor-intense workarounds”

Michael Sampson, Osterman Research: "a significant proportion of organizations are not sufficiently proactive"

Digitalization has brought immense opportunities to make the ways we conduct business, complete day-to-day tasks, and spend our free time...
Read more about Michael Sampson, Osterman Research: "a significant proportion of organizations are not sufficiently proactive"

Gray Chynoweth, Minim: “the beating heart of the home network is the Wi-Fi gateway, router or mesh system, and the software it operates”

A way to a person’s heart might be through their chest, but a way to a person’s home is through...
Read more about Gray Chynoweth, Minim: “the beating heart of the home network is the Wi-Fi gateway, router or mesh system, and the software it operates”

Protecting server workloads across the supply chain

The growth in cybercrime during the COVID era has been well documented, but the true scale of this growth was...
Read more about Protecting server workloads across the supply chain

No allies in the cyber world: how Chinese hackers collect intelligence on Russian government officials

The China-based Bronze President hacking group has shifted its focus to Russia, likely gathering intelligence on Russian state officials and...
Read more about No allies in the cyber world: how Chinese hackers collect intelligence on Russian government officials

Are backups the best way to tackle ransomware?

The surge in ransomware attacks during the COVID-19 pandemic has been well documented. There has scarcely been a sector that...
Read more about Are backups the best way to tackle ransomware?

Data thieves zone in on tourists

Dreaming of a trip to sun-kissed Thailand for your holidays? Cyber crooks are dreaming about stealing your sensitive data as you book your ideal vacation – using remote-code execution tactics and fake travel websites to get inside your machine.
Read more about Data thieves zone in on tourists

308,000 databases were exposed to the open web in 2021: report

The conversation surrounding the importance of data security doesn’t seem to be coming to naught in light of the new...
Read more about 308,000 databases were exposed to the open web in 2021: report

Eimy Veronica Rodriguez, Htech: "some companies see security as an expense and not an investment, and it shouldn’t be like that"

With the rise in online purchases, it is more important than ever to adopt sophisticated payment security solutions. Unfortunately, many...
Read more about Eimy Veronica Rodriguez, Htech: "some companies see security as an expense and not an investment, and it shouldn’t be like that"

Tim Dowling, TrustedSite: “businesses need to get the attacker’s view to reduce perimeter risk”

Because the rapid digital transformation caused organizations to greatly increase the number of assets they expose to the Internet, cyber...
Read more about Tim Dowling, TrustedSite: “businesses need to get the attacker’s view to reduce perimeter risk”

Azi Cohen, CyberMDX: “in healthcare, customer data theft can put human lives at risk”

Considering that cybersecurity in the healthcare sector is responsible for peoples’ lives, it shouldn’t be overlooked, and all security gaps...
Read more about Azi Cohen, CyberMDX: “in healthcare, customer data theft can put human lives at risk”

Debrah True, Akoya: “once people provide their credentials externally, they put themselves at risk”

It is a truth universally acknowledged that your banking credentials and other important login information should never get exposed to...
Read more about Debrah True, Akoya: “once people provide their credentials externally, they put themselves at risk”