A new paper shows that with the right amount of hardware and know-how, an attacker can spoof a vehicle's GPS system and change the route.
IDT CIO Golan Ben-Oni has faced down two serious cyberattacks in the last year and he expects more are on the way. From selecting vendors to thinking about the cloud, here's how Ben-Oi is rethinking the security landscape.
With Broadcom buying CA for $18.9 billion, old-time big iron is suddenly cool again. Here's what it means for security and software development.
In the first half of 2018, Check Point researchers saw threat actors turning more of their attention to the cloud to steal data, as well as to grab compute power for cryptomining efforts.
The number of bug bounty programs continues to grow, and enterprise security is better for it. A new report urges more businesses to embrace and not squash these initiatives.
ARCHIVEDWhat You Can Do To Strengthen Security Over Your Clouds
Tuesday, June 26, 2018
1:00 p.m New York/ 6:00 p.m. London
ARCHIVED | August 31, 2017, 3pm EDT
An interview with Steve Grobman, CTO of McAfee
Tweets by Security_Now_
like us on facebook