Walt Szablowski, Founder and Executive Chairman of Eracent, cautions that there is a blind spot for software asset procurement and management teams when selecting and managing software products. It’s imperative for all application users and developers to understand what licensing requirements and potential security risks are involved in widely used open-source software (OSS). Maintaining compliance and protecting against vulnerabilities requires complete visibility and constant vigilance to ensure legal compliance, protect intellectual property, and avoid costly litigation and security breaches. Continue reading
Rockwell Automation, Inc. (NYSE: ROK), the world’s largest company dedicated to industrial automation and digital transformation, today announced the findings of its report “Anatomy of 100+ Cybersecurity Incidents in Industrial Operations.” The global study conducted by Cyentia Institute analyzed 122 cybersecurity events that included a direct compromise of operational technology (OT) and/or industrial control system (ICS) operations, collecting and reviewing nearly 100 data points for each incident. Continue reading
In May 2023, the Dallas City Government was hugely disrupted by a ransomware attack. Ransomware attacks are so-called because the hackers behind them encrypt vital data and demand a ransom in order to get the information decrypted.
Mobile operators need to reassess security vulnerabilities in the key GTP (GPRS Tunnelling Protocol) protocol and bolster GTP security within their networks as they continue to invest in and roll out 5G, according to a new study by SecurityGen, the global provider of security solutions and services for the telecom industry. Continue reading
Scams are one of the most pervasive Cyber Safety threats of our time. The sheer volume is staggering – people are collectively wading through 3.4 billion phishing emails on a daily basis – and scams are becoming more sophisticated and harder to spot without help. Today, Norton, a leader in Cyber Safety and part of Gen™ (NASDAQ: GEN), is inviting people to join in the fight against scams by offering early access to Norton Genie, a real-time AI-powered scam detector, to provide an easy, fast and free way to check if texts, emails, websites and social media posts are a scam. Continue reading
By Diana Baptista | Data Journalist
Digital rights groups in Brazil protested against Smart Sampa, a government program seeking to install 20,000 security cameras with facial recognition technology in São Paulo by 2024.
Using drones, the groups projected slogans like “No More Invasive Surveillance” and “Respect our Rights” on building walls. Continue reading
SUSE®, a global leader in innovative, open and secure enterprise-grade solutions, today released findings from its industry trend report “Securing the Cloud,” which sheds light on the pressing challenges faced by IT teams in securing cloud environments and offers insights into effective solutions. Based on comprehensive polling of 501 C-suite to IT professionals across the United States, Germany and the United Kingdom, the report highlights the state of cloud native adoption, major security concerns, and how to address them. Continue reading
What makes a business an enterprise? The name itself suggests something bigger, something vast and far-reaching. However, enterprises come in many sizes, but what they have in common, large and small, is dispersion. The business may have multiple locations, levels, departments, divisions, and subdivisions that must work together to achieve the company’s goals. Continue reading