
Bolstering Risk And Cybersecurity Strategy Safeguards The Remote Workforce
When Covid-19 prompted lockdowns around the world last year, most businesses made the impromptu decision to safeguard employees and allow them to work from home (WFH). Most companies acted efficiently in making this abrupt transition to a new remote working model led by WFH.

Cybersecurity: Same Threats, New Challenges
For business leaders, 2020 was many things. A test. A catalyst. An opportunity.
For chief information security officers (CISOs), it was all of these things at once—with the security of the business hanging in the balance. This was especially true when it came to the rapid shift to remote work.

WhatsApp Soundly Beaten By Apple’s Stunning New iMessage Update
WhatsApp, the world’s leading messenger with 2 billion users sending 100 billion messages each day, popularized secure messaging. But if you’re one of the hundreds of millions using WhatsApp on an iPhone, you’re in for an unwelcome surprise when you see Apple’s stunning new iMessage update.

The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase
Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup.

Revealed: How The EU Funds Global iPhone And Facebook Surveillance
Police across the world are getting special training from a little-known European Union agency on how best to snoop on Facebook and Apple iPhones, according to documents obtained by nonprofit Privacy International.

All Tricks And No Treat: Preparing For IT Chaos In 2021
The tech industry is filled with shock statements about the unexpected sea of spooky threats just around the corner and how to prepare for them. But disaster recovery, backup, and resiliency are not the glitziest subjects when times are stable.

Development of anti-phishing browser based on random forest and rule of extraction framework
Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information, such as login credentials and credit and debit card information, etc. It is carried out by a person masquerading as an authentic individual.

Is Your Boardroom The Weakest Cybersecurity Link?
From phishing to ransomware, one of the primary challenges with effective cybersecurity risk management is related to the weakest link theory. The essence of this theory is the phrase “a chain is no stronger than its weakest link.” This idiom reflects the fact that effective cybersecurity risk management is a complex system of related and inter-dependent parts. If one component fails, it can jeopardize the entire system.

China tightens tech export controls potentially jeopardizing TikTok deal, reports say
According to the reports, China updated its export control rules to incorporate technology that could include TikTok, a claim later reasserted by commentary published in China’s state-controlled Xinhua news agency on Saturday.

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020
These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and the recent announcement, Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here.

India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra
India needs an army of cybersecurity experts, tools and technology to protect its assets against malicious attackers as data becomes a pervasive “lifeline” for countries, says C. P. Gurnani, CEO and managing director of Tech Mahindra.

Protecting the home network is a new challenge and a new reality, says cybersecurity exec
RSA Security President Rohit Ghai explains how the cheese has moved for his business from protecting the office to protecting the home.

Why Google And YouTube Are Now China’s Most Wanted
“Without any solid evidence,” a Chinese government spokesperson complained last week, “some people in the U.S. have been abusing the concept of national security to suppress non-American enterprises. These U.S. moves are utterly disgraceful.” You can use Google to find those comments on the ongoing TikTok pantomime if you like—they’re online.

How Hackers Use Sound To Unlock The Secrets Of Your Front Door Key
When thinking about physical security in the cyber realm, the mind, more often than not, turns to the risks posed by so-called smart locks. When I recently asked 549 security professionals if they would use a smart lock, 400 of them said no, get in the sea.

Has Trump Suddenly Ended Huawei’s Smartphone Business?
The battle between the Trump administration and Chinese tech company Huawei has escalated materially this week—and while the implications have not yet been fully assessed, this looks like it could be the game-changer.

Malicious Chinese SDK In 1,200 iOS Apps With Billions Of Installs Causing ‘Major Privacy Concerns To Hundreds Of Millions Of Consumers’
A Chinese ad network named Mintegral is accused of spying on user activity and committing ad fraud in more than 1,200 apps with 300 million installs per month since July 2019. Mintegral is headquartered in Beijing, China, and is owned by another Chinese ad network, Mobvista, which has a head office in Guangzhou, China.