cyber attack

cyber attack news search results

Developer news items we found relating to cyber attack

10 results
Elastic-Stack-7.3-brings-maps-and-more

Elastic Stack 7.3 brings maps and more


Monday, August 5, 2019 by

Elastic has delivered Elastic Stack 7.3, which includes some very cool new features such as data frames, anomaly detection, elastic maps, and more. Check out all the highlights of the latest release below. Elastic Stack 7.3 highlights  Data frames: a new feature that allows users to pivot their Elasticsearch data on the fly to create live entity-centric in...


Zero-latency-apps-gets-closer-to-reality-thanks-to-Redis-Labs

Zero latency apps gets closer to reality thanks to Redis Labs


Tuesday, November 20, 2018 by

Complex technologies like a self-driving car take in huge amounts of data from its environment, processing it and make appropriate decisions on how to respond within a few milliseconds. This is the kind of zero latency future Redis Labs is enabling, and they announced at Redis Day London, the latest release of Redis Enterprise with two key functionalities: Red...


IoT-medical-devices-aren

IoT medical devices aren't as secure as you think


Monday, November 5, 2018 by

Zingbox released the report of its second annual Healthcare Security Survey. The survey was expanded this year to include not only IT/IS professionals, but also clinical and biomedical engineers who play critical roles in managing and securing connected medical devices. The survey revealed a contradiction between the confidence that healthcare professionals have in t...


What-American-companies-can-learn-from-Europe

What American companies can learn from Europe's new GDPR laws


Wednesday, June 13, 2018 by

People around the world have recently started to receive tons of emails from companies updating their privacy policies. Naturally, many ask, why this is happening, and the ones with a deeper understanding of the process mutter a four-letter combination - GDPR. While an astounding part of the US Senate appears to be confused about the concept of Net Neutrality, Europe&rs...


NVIDIA-urges-congressional-committee-to-embrace-AI

NVIDIA urges congressional committee to embrace AI


Thursday, February 22, 2018 by

Artificial intelligence represents the biggest technological and economic shift in our lifetime, NVIDIA’s Ian Buck told a U.S. Congressional committee recently. In testimony before a hearing of the House of Representatives Subcommittee on Information Technology, Buck, vice president and general manager of our Tesla business, said the federal government should increase r...


Many-fintech-DevOps-are-not-enforcing-security

Many fintech DevOps are not enforcing security


Tuesday, June 6, 2017 by

Venafi has announced the results of a study on the cryptographic security practices of DevOps teams in the financial services industry. Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is a particular issue for financial services organizations, whi...


8-cyber-security-predictions-for-what

8 cyber security predictions for what's to come in Asia-Pacific


Thursday, December 29, 2016 by

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...


IT-Governance-of-Sensitive-Files-on-Corporate-and-BYOD-Mobile-Devices

IT Governance of Sensitive Files on Corporate and BYOD Mobile Devices


Monday, June 20, 2016 by

Mobile content has brought new agility and efficiency to just about every enterprise. "Mobile communication and collaboration is accelerating and improving enterprise productivity and growth like no other universal technology since the dawn of the Web 25 years ago,” says Josh Bohls, Founder, Inkscreen. But these advantages come at a cost.Says Bohls, “Ask any o...


What-You-Need-to-Know-about-BYOD-Security

What You Need to Know about BYOD Security


Wednesday, December 2, 2015 by

As employees bring their own devices to work, IT teams face an assortment of challenges, from managing mobile apps on a myriad of different devices to backing up and restoring business data. But bar none, the greatest burden for IT staff is securing business data on mobile devices.The Good, the Bad, and the Ugly (in Reverse Order)The UglyThe BYOD phenomenon has spawned ...


An-Analysis-of-the-Starbucks-Cyber-Attack-and-How-To-Stay-Protected

An Analysis of the Starbucks Cyber Attack and How To Stay Protected


Wednesday, June 10, 2015 by

How much is a cup of coffee really worth? Several weeks ago, many Starbucks customers began reporting their Starbucks card balance emptied and then topped again. On May 13th, Starbucks released a written statement  denying the un-authorized activity was a result of a hack or an intrusion to its servers or mobile app. But the hard facts show that indeed customers ha...