California Federal Court Weighs In (Again) on Social Media Scraping
Social media sites such as Facebook and LinkedIn have collected personal information on hundreds of millions of subscribers. They have also promised those subscribers that their data will only be shared or used for particular purposes—agreements that are not only enforceable but also are required to be upheld under various ... Read More
Securing the Office of the Future
Our latest episode of “The CyberHero Adventures: Defenders of the Digital Universe” focuses on answering the question: How do organizations secure the office of the future? Businesses have demonstrated that they can quickly shift their workforce from on-premises to remote, with 73% calling it a “success,” according to PwC’s recent ... Read More
Old Vulnerabilities Open the Door for WannaCry Ransomware
More than three years since it was discovered, WannaCry is still a threat for some organizations, research has found How often does your organization conduct a security assessment? Once a year? Once a month? It’s great that your organization is looking at its security thoroughly, but what happens between those ... Read More
Second Swiss Firm Said to Be CIA Encryption Puppet
First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA ... Read More
Unisys Adds Visualization Tools to Stealth Platform
Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time. Vishal Gupta, chief technology officer and senior vice president of products and platforms at Unisys, said previous versions ... Read More
Pay2Key Ransomware Joins the Threat Landscape
As we approach the end of a year that has been trying for so many reasons, yet another ransomware has been seen in the wild targeting corporations—in particular, Israeli companies. A report published by Check Point Software tells of the new ransomware, which is called Pay2Key based on the heading ... Read More
Google Finally Pulls Chinese Apps Stealing Personal Data
After six million downloads, two spyware Baidu apps have been removed from the Play Store. What took Google so long? ... Read More
DevSecOps: 4 Reasons You Need One
Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining security and DevOps. Often, software developers leave security testing to the very end. However, following this approach leads ... Read More
FireEye Acquires Respond Software to Advance Cybersecurity AI
FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, executive vice president and COO for FireEye, said the acquisition of Respond Software adds eXtended Detection and Response ... Read More
Ransomware Increase Highlights Need for Better IT, OT Security
IT networks tend to get all the attention for cybersecurity, but operational technology (OT) and the supply chain are at increasing risk of cyberattacks. Manufacturing security needs to deploy a more holistic view of their systems, by securing the infrastructure, supply chain and the products they manufacture. To protect the ... Read More




