Security feed

Today
Deltek, a provider of software and solutions for project-based businesses, appointed Caleb Merriman as its Vice President and Chief Information Security Officer (CISO). [...]
Wed, Feb 26, 2020
Source: Security magazin
At the turn of the century, facial recognition technology was more science fiction than fact. Rapid advances have fueled a proliferation of this technology — which continues to expand into new areas of public and private life. At the same time, various states and municipalities are enacting new, stringent laws [...]
Wed, Feb 26, 2020
Source: Security magazin
The National Association of Corporate Directors (NACD) and the Internet Security Alliance (ISA) released a new, updated Director's Handbook on Cyber-Risk Oversight, a guidebook to help boards navigate cyber-risk oversight. [...]
Wed, Feb 26, 2020
Source: Security magazin
Registration is now open for the spring season of the National Cyber League (NCL) competition. [...]
Wed, Feb 26, 2020
Source: Security magazin
A bill introduced in the South Carolina Statehouse would make school security purchases sales tax exempt. [...]
Wed, Feb 26, 2020
Source: Security magazin
Mozilla has started rolling out encrypted DNS-over-HTTPS (DoH) by default for its Firefox users in the United States. read more [...]
Wed, Feb 26, 2020
Source: securityweek
Earlier
The annual cryptographer's panel took on issues of privacy and how new crypto-technologies apply to it in today's digital world. [...]
Tue, Feb 25, 2020
Source: Threat Post
Google patches zero-day bug tied to memory corruptions found inside the Chrome browser's open-source JavaScript and Web Assembly engine, called V8. [...]
Tue, Feb 25, 2020
Source: Threat Post
The reality of the cybersecurity industry is starkly different than what's perceived by the rest of the world. [...]
Tue, Feb 25, 2020
Source: Threat Post
Chief Security Officers (CSOs) are charged with protecting an organization's assets and people. Like all corporate functions, the design of this department will vary greatly depending upon the organization. However, the process by which a program is designed, measured and evaluated has some consistent principles across different industries. This series [...]
Tue, Feb 25, 2020
Source: Security magazin


Print pagePDF pageEmail page