Security News & Reviews - Page 7
More Security News
NEWS ANALYSIS: The House of Representatives is considering H.R. 1, an omnibus bill that includes a number of election security measures, along with a wealth of other provisions.
eWEEK DATA POINTS: Master Product Manager for Oracle Database shares with readers some best practices on how organizations can better secure their data at the database level.
Mastercard is implementing the EMV 3-D Secure 2.0 specification in an effort to help improve the overall experience of online credit card payment authorization.
Serverless computing offers new opportunities for cloud efficiency, but it also comes with new risks that Protego Labs is looking to help enterprises better understand.
NEWS ANALYSIS: Last month, a pair of security researchers demonstrated how it’s possible to fool a vein recognition system, but they also showed just how hard that actually is to do. New-gen scanners work a lot better now than they did previously, but like any biometric reader, they can be...
Detecting fraudsters calling into an organization's phone system can occur even before the hacker picks up the phone, with technology that Neustar has now gained from Trustid.
Fewer consumers than first reported were impacted by the data breach, though it has now been disclosed that information on millions of passports was also stolen.
PREDICTIONS 2019: eWEEK revisits the security genre because it is always one of the three most important and controversial topics in IT year after year. Experts predict IT security will face even more challenges in the next 12 months than it did in the past year.
Hackers post an unauthorized message on vulnerable Google Chromecast devices, revealing a flaw that users can easily remediate.
DAILY VIDEO: NIST Risk Management Framework 2.0 updates cyber-security policy, and Skype adds live captioning and subtitles for improved accessibility.
NEWS ANALYSIS: The attacks using the Ryuk ransomware, apparently from North Korea, require the best of best practices, and that means understanding why they take place and how to prepare. If you’re attacked by someone using Ryuk, it’s going to be very expensive.
eWEEK TOP COMPANIES: New-gen data storage is all about providing the correct information on demand while at the same time maintaining data privacy for users at all levels. These requirements are the same for physical data center storage and for storage in a cloud service.