This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
DefenTec began as a managed services provider (MSP) before transitioning into a managed security services provider (MSSP). Now, in addition to optimizing their clients’ data environments through managed services, IT support and consulting, and cloud computing, DefenTec also fortifies them through a full range of managed security services, including secure Wi-Fidesign, network audits, and of course, password management. How does DefenTec use KeeperMSP to further guard their clients from cyberattacks?
COVID-19 has initiated a whole new host of cybersecurity threats. Twitter was one of the latest victims, its employees allegedly being targeted so that hackers should take over the accounts of certain verified users. And just before that, a June 25 story in The New York Times detailed the way in which a foreign entity is attempting to infiltrate American business by taking advantage of remote employees whose organizations – more than 400 million worldwide – use virtual private networks (VPNs).
A new Digital Shadows report focuses on the escrow systems used on cybercriminal forums. These systems are deeply sophisticated, relying not just on similar technological mechanisms as traditional ecommerce, but on social, community oriented mechanisms as well, such as arbitration.
U.S. Transportation Secretary Elaine L. Chao announced that the Federal Aviation Administration (FAA) is awarding $3.3 million in research, education and training grants to universities that comprise FAA’s Air Transportation Center of Excellence (COE) for Unmanned Aircraft Systems (UAS), also known as the Alliance for System Safety of UAS through Research Excellence (ASSURE).
Google has admitted that its Home speakers recorded users at all times, even when they hadn't said "wake words" such as "OK Google," due to a security error earlier this year.
Six out of ten businesses target geographic diversification of supply chains to build resilience.
August 11, 2020
According to the Supply Chain Resilience Report 2020 from 3D Hubs, cybersecurity issues have affected less than 10% of firms over the past 10 years, compared to 60% that have suffered directly as a result of COVID-19 disruption.
A new study reveals that 93 percent of security professionals lack the tools to detect known security threats, and 92 percent state they are still in need of the appropriate preventative solutions to close current security gaps.
As much of the world continues to hunker down at home in response to COVID-19, threat actors continue to find ways of exploiting the crisis to gather sensitive and valuable information from individuals. But while we’re busy making sure that our primary computers and cloud-based accounts are locked down, it’s often the devices we least suspect – our smartphones – that provide the opening that hackers need. The 2018 hacking of Jeff Bezos’s iPhone X, perhaps the most famous example of smartphone hacking, provides an important reminder that these most personal of devices should be used with appropriate caution, especially in this time of upheaval.