Companies that are security-conscious continue to expand their selection of data protection methods as their network access points keep on growing in an unprecedented level. Although among the most widely used security protocol is encryption, many are reviewing their encryption strategies in an era of sophisticated and persistent threats.
News
Fighting Software Piracy with BSA’s Online Reporting Tool
This is a sponsored post written by me on behalf of BSA | The Software Alliance . All opinions are 100% mine. Piracy has been a recurring and arguably one of the biggest challenges software companies had to contend with every day.
Is Apple Redesigning its Mapping App for Driverless Car?
After many years of mapping debacle, Apple seems to have finally learned its lesson and now looks poised to relaunch its mapping service with a whole new pack of refreshed and accurate details.
CareFirst BlueCross BlueShield is the latest victim of health insurance cyber attack
CareFirst BlueCross BlueShield has found that it has been targeted by a spate of cyber attacks lately, the latest discovery of a cyber breach that involves a health insurance provider.
Thousands of websites in critical condition amid an old TLS encryption flaw
It’s a shame that several old security flaws that date back to as early as the 1990s continue to be uncovered by researchers in the 21st century, the latest of which being a critical vulnerability of the Transport Layer Security (TLS) protocol that enables an attack on the communication between a user and thousands of websites/mail […]
Stop backdoor access, tech firms tell Obama
In the fight against cybercrime and the struggle to protect individual privacy, the U.S. government and American tech firms are in a state of deadlock conflict in the post-Edward Snowden era.