Claroty researchers have uncovered six critical vulnerabilities in third-party license management components, which could expose operational technology (OT) environments (hardware and software components) across numerous industries to exploits via cyberattacks.
Threat actors breached the network of cybersecurity company Avast in a sophisticated cyber operation, referred to as “Abiss,” that likely attempted to poison the supply chain and target its anti-virus software, CCleaner.
In a recent Security webinar, How You Can Turn Security Training and Awareness into Action, Pieter Danhieux, Co-Founder and CEO of Secure Code Warrior, says there are 111 billion lines of code written by an estimated 22 million developers every year. “Building code is like building a house. If you do everything well, you end up with a beautiful, modern and secure house,” says Danhieux.
Vimeo, a video platform, has been accused of violating the Illinois Biometric Information Privacy Act (BIPA) for illegally storing, collecting and using individuals' biometric indentifiers and biometric information without written consent.
The French government’s plan to launch facial recognition technology in November with the aim of giving citizens secure digital identities “seems premature,” Digital Minister Cedric O told Le Monde newspaper.
Penn State World Campus students have developed a multi-pronged data analysis approach that can improve Internet of Things (IoT) devices to protect against cybersecurity threats, according to a Penn State news report.
ON DEMAND: This webinar will cover the design phase of the Yale Police Department’s existing radar layout at the Yale Bowl and the security challenges it has presented. It will also discuss the need to keep the historical nature of the Yale Bowl building in mind while designing a new surveillance system. In addition, the webinar will cover how the Yale public safety team is using the new surveillance system to identify a suspect to decide, in real time, whether or not to dispatch additional resources.
ON DEMAND: The security ecosystem protects digital assets, physical assets, and people - the newly distributed workforce creates new and increased physical and cybersecurity risks. Situational and security awareness is a role every employee must play, and you’ll help get them there with awareness, cybersecurity hygiene and security practices that help keep company, employee and customer information safe.