Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
Secure the mix of legacy and modern solutions in IIoT

Blog  Logistics today is governed by a set of principles called the seven Rs: the right product, the right customer, the right price, the right quantity, the right condition, the right place and the right time. Upholding these principles demands a Herculean effort. Luckily, logistics managers have some he...

Last updated: Sep 20, 2019   9:06 PM GMT  |  Blog: IoT Agenda   |      Cyberattacks, IIoT, IIoT network
How Has Cyber Security Evolved in the Last 10 Years

Blog  The last ten years of cyber security have taught us a lot about hackers and their resilience to infiltrate some of the biggest companies in the world. Common mistakes continue to occur, such as Instagram account passwords being held in text format, and regular Internet users continue to fall for phi...

Last updated: Sep 9, 2019   5:20 AM GMT  |  Blog: SAS 70
7 cybersecurity tips for small business

Blog  Many small business owners misguidedly feel their organization is too small to become a target for hackers however, cyberattacks on small companies are typical and they're increasing. An effective attack on a Fortune 500 firm is likely to be a lot more rewarding, but much tougher. Small companies ar...

Last updated: Sep 3, 2019   3:48 AM GMT  |  Blog: SAS 70
Input validation issues open Cisco firewall vulnerability

Blog  Standard security practices are the baseline for any product, and even the most junior software developers should be aware of the minimum security requirements for any project. And yet, something as simple as a lack of input validation still plagues the industry. For example, a firewall vulnerabili...

Last updated: Aug 29, 2019   8:38 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions

Blog  Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access is returned to the victim. Continued... Quote of the Day "The catastrophic capabilities of ransomware attacks on pu...

Last updated: Aug 22, 2019   7:28 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Top four considerations when securing the multi-cloud environment

Blog  This is a guest post byStephen Dane, managing director for cyber security at Cisco Asia-Pacific, Japan and Greater China We live in a multi-cloud world. A world where a multitude of offerings from cloud service providers (CSPs) gives us the potential to respond to business opportunities and chall...

Last updated: Aug 22, 2019   7:28 AM GMT  |  Blog: Eyes on APAC
Defending Industrial IoT the truth lies in the data

Blog  Self-driving cars and smart medical equipment, once the stuff of science fiction, are a fact of life in today's digital, connected world. Network infrastructure connects devices in virtually every industry, making life more convenient and more productive for us all. But how safe is a future where ba...

Last updated: Jul 31, 2019   4:36 PM GMT  |  Blog: IoT Agenda   |      IIoT, IIoT analytics, IIoT security
deep packet inspection (DPI)

Blog  Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued Quote of the Day "DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and othe...

Last updated: Jul 17, 2019   5:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from
How Safe Is Your Enterprise Backup Data from Malware Attack? @asigra

Blog  How many CIOs and CTOs can surely claim that their enterprise backup that is being taken regularly is not contaminated with any kind of Malware. A recent report published by DCIG features cybersecurity approaches from the legends in the field like Asigra, Rubrik, and Dell. Detecting and preventing m...

Last updated: Jul 10, 2019   4:28 PM GMT  |  Blog: Quality Assurance and Project Management   |      Asigra, Backup and restore, Backup Recovery and Media Services
Security controls must keep pace with internet-connected devices

Blog  The ability to connect devices is becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for availability...

Last updated: Jul 8, 2019   6:59 PM GMT  |  Blog: IoT Agenda   |      Cyber security, Cyberattacks, Internet of Things
IoT security and the new branch office

Blog  IoT is now an integral part of every networked environment, from corporate headquarters to the home network. Branch offices and retail locations have been adopting IoT at a breakneck pace, using these devices to provide a wide range of services, while using SaaS cloud servers as their management int...

Last updated: Jun 26, 2019   6:51 PM GMT  |  Blog: IoT Agenda   |      Branch Office, branch security, Internet of Things
New Cloud Daddy CEO aims to 'tell the world' about AWS protection

Blog  The new CEO of AWS data protection provider Cloud Daddy is looking to tell his company's story and drastically increase its customer count. "We've got to get people to know about Cloud Daddy," said Spencer Kupferman, the former president and CEO of reporting and automation platform provider Global ...

Last updated: Jun 21, 2019   12:46 AM GMT  |  Blog: Storage Soup   |      Cloud Backup
Security concerns remain a drag on the internet of things

Blog  Concerns about security continue to hinder the adoption of IoT devices. Enterprise customers indeed are interested in buying more IoT devices, but only if vendors can provide better security for them. Bain & Company conducted research into the attitudes of enterprise buyers about cybersecurity ...

Last updated: Jun 20, 2019   2:57 PM GMT  |  Blog: IoT Agenda   |      built-in security, embedded security, Internet of Things

Answer  is there a malware on mobile devices specifically on android that can leak all of your photos in a site?

Last updated: Jun 14, 2019   1:44 AM GMT   |    , Android phones, malware
How to deal with a remote code execution vulnerability

Blog  Visual Studio Code is a free source code editor developed by Microsoft for Windows, Max OS and Linux. On February 12, 2019 Symantec Security Center found a serious remote code execution vulnerability (CVE-2019-0728) in MS Visual Studio Code. This vulnerability ties into another one back in June of 2...

Last updated: Jun 10, 2019   3:31 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions   |      Uncategorized
How to have a safe connected cyber summer

Blog  Summer means vacations and down time. People are booking hotels, arranging travel or settling in at the beach with the digital version of a summer novel. For many families, the kids are home from school and permanently wired in to an array of connected devices. So, along with the sunscreen and bug s...

Last updated: Jun 7, 2019   5:20 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT cybersecurity
Cyber Security Needs to Start With the Simple Things

Blog  There is no way to ensure you dont ever get hacked. After all, government agencies with insane security systems also get their data stolen by hackers from time to time. Of course, there is a huge difference between people who perform cyber attacks on government agencies and those who target indiv...

Last updated: Jun 7, 2019   12:11 AM GMT  |  Blog: SAS 70
How to mitigate the IoT attacks that are increasing at 217.5%

Blog  Did you know the number of IoT devices is expected to increase by 75.44 billion by 2025? Over the years, there's been a rapid surge of IoT devices in the market, since more users are now opting for connected gadgets and appliances. To meet the increased demand of users, manufacturers are rushing th...

Last updated: May 29, 2019   4:13 PM GMT  |  Blog: IoT Agenda   |      Encryption, firewall, Internet of Things
It's time to get serious about securing the internet of things

Blog  Not long ago, many IT leaders viewed IoT as little more than an interesting science project. Today, companies in every industry rely on IoT insights as part of their core business strategies. According to DigiCert's recent "State of IoT Security Survey 2018" (registration required), 92% of companies...

Last updated: May 16, 2019   4:26 PM GMT  |  Blog: IoT Agenda   |      Certificate authority, digital certificate, Internet of Things
Protecting the modern infotainment system

Blog  Whether you are glancing at GPS prompts, connecting to your favorite streaming satellite music station or using Bluetooth in conjunction with a dizzying number of apps available on your smartphone, the infotainment system in your car is largely innocuous and inconspicuous -- at least in the grand sc...

Last updated: May 13, 2019   5:37 PM GMT  |  Blog: IoT Agenda   |      Buffer overflow, car security, Connected car
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: