There is a trade-off between technology innovation and security. The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) which are often built with basic security controls, creating a larger attack surface. At the same time, reliance on data means that data breaches can cause greater damage.
The United States Patent and Trademark Office (USPTO) and the National Crime Prevention Council (NCPC) launched the newest public education resources for the Go For Real Anti-Counterfeiting Campaign online.
CenturyLink, Inc. announced that Hugo Teufel has joined the technology company as its new chief privacy officer. As a noted expert in the field, he will advise the company on privacy and security issues and will work closely with CenturyLink’s sales, IT and security teams to help design, implement and refine strategic privacy initiatives throughout the company.
The new NIST standards for IAST and RASP are a testament that outside-in AppSec approaches are antiquated, inefficient, and ineffective. Security instrumentation is more than a paradigm shift of the future—it is an opportunity for today.
Bahrain, Kuwait and Norway have rolled out some of the most invasive COVID-19 contact tracing apps around the world, putting the privacy and security of hundreds of thousands of people at risk, an Amnesty International investigation reveals.
As some schools begin to reopen and others start planning for next year, student and staff safety need to remain top of mind, and administrators need the right solutions in place to keep risks of all kinds at bay. However, these solutions must be flexible and able to adapt to changing circumstances, while still executing clear communication and quick response to reduce school safety risks.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) added a new calculator to their online tools today to estimate the natural decay of SARS-CoV-2 (the virus that causes COVID-19) in the air under various environmental conditions.
Recently, data tokenization has proved to be a successful protection method for securing sensitive information and all instances of personal data. This is because it allows information to retain its analytical value, while ensuring that it meets regulatory requirements.