Mozilla has started 2018 off with a major announcement: “Effective immediately, all new features that are web-exposed are to be restricted to secure contexts.” “Web-exposed” means any features accessible from a web page or web server. This applies to new APIs, such as WebVR, a major addition Mozilla has been working on for some time. […]
Encryption
What are over-the-air-updates?
With more devices connected to the internet than ever before, we’re all interested in finding out how the latest gadget will make our life easier. But usually, as consumers, the furthest thing from our minds is how a device will stay up-to-date and if there is security built-in. Device manufacturers are more mindful of both […]
Prepare Now for General Data Protection Regulation or Be Ready to Pay Fines
The new European Union General Data Protection Regulation (GDPR) deadline is May 25, 2018, and despite that date quickly approaching, research shows many companies still aren’t ready. If they remain non-compliant, companies will face a fine up to 4 percent of annual turnover or €20 million (whichever is greater) per breach or issue related to […]
OpenSSL Patches Five Security Vulnerabilities
The vulnerabilities identified in OpenSSL do not affect SSL Certificates; system admins should patch their OpenSSL framework as soon as possible
Ransomware: A Threat On The Rise
Cyber warnings have been issued and news has been reported, but Ransomware is still a thriving business. Prevention may just be the greatest key to safety.
45% of Healthcare Breaches Occur on Stolen Laptops
Data breaches caused by stolen devices are common and can deliver a huge financial blow to an organization.
Debunking SSL and HTTPS Security Myths
Myths about SSL protection and HTTPS encryption may elicit false misperceptions about proper enterprise security. Here are some of the most common myths debunked.
PKI: Solving the IoT Authentication Problem
According to Gartner, public key infrastructure (PKI) will re-emerge as one of the most relevant mechanisms for organizations to address the IoT authentication problem.
SLOTH Attacks and the Risks Involved
It’s time to move away from older cryptographic algorithms and onto stronger ones for better enterprise security.