In episode 327, Douglas Brown interviews J.Tyler “T. Rex” Rohrer, Co-Founder / Strategic Alliances and Jason E. Smith, VP, Product Marketing at Liquidware. Tyler. Jason and Douglas discuss what’s new in the latest ProfileUnity, FlexApp, and Stratusphere releases, how the world has changed since Covid-19, their IGEL integration, and so much more! This is a […]
New Azure maps make identifying local compliance options easy
Countries around the world are placing more compliance requirements on organizations of all types, and customers want to more easily understand which compliance offerings are available in their locale before they deploy cloud resources. Today we’re releasing a new infographic, along with a 37-page e-book showing compliance details in over 30 key geographies. Organizations around […]
Premier League’s Return: A Hat Trick of Cyberthreats?
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Claire’s Customers Targeted with Magecart Payment-Card Skimmer
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Three questions network operators should ask about IoT security
There is no doubt that the COVID-19 pandemic put the reliability and security of communications networks under the spotlight as millions of people reverted to work, care, and learn from home, says Steve Buck, SVP product and operations, security business unit at Mobileum. Many have commented that out of necessity, the digital transformation of many industries […]
A data heist: Less of a concern if it is on device
The issue In 2019, a Symantec security report found that around three quarters of all hacks were attempted on point-of-access devices such as routers. A mostly unsurprising fact given the scope of the access a hacker could obtain if he or she was able to compromise it, says Daniel Albertini, CTO, Anyline. With that mostly […]
Identifying and troubleshooting VPN session timeout issues
[unable to retrieve full-text content]
Encryption Utility Firm Accused of Bundling Malware Functions in Product
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Imprivata: Trusted Digital Identity Management for Clinicians, Patients & Connected Medical Devices – Episode 325
In episode 325, Douglas Brown interviews Wes Wright, Chief Technology Officer at Imprivata. Douglas and Wes discuss Imprivata’s trusted digital identities solution for clinicians, patients, and connected medical devices. Wes shares his views on the changing world we find ourselves in, what this means for healthcare IT, how they work with IGEL technologies, and much […]
Why 98% of IoT traffic is unencrypted
98 percent of IoT Traffic is unencrypted . When I read that statistic – published by Palo Alto Networks in their Unit 42 2020 Threat report – I should have been shocked, says Mike Nelson,VP of IoT Security at DigiCert. Last year, a Z-Scaler report said something similar: That 91% of IoT traffic was unencrypted. While […]