Reducing The Security Risks Of Mobile Technology To Improve Patient Care

It’s hard, if not impossible, to think of a time when more attention has been paid to healthcare. While the government and the National Health Service (NHS) throw every resource possible at meeting the demands of caring for those struck down with COVID-19, it’s also important to look at how general healthcare standards can be […]

Cybersecurity Expert Comments On Zoom And The Importance Of Security

Zoom is making rapid security changes after being banned from a number of high-profile businesses including Siemens, SpaceX and Standard Chartered following high-profile criticism from the InfoSec community. Where does this leave Zoom and what can other businesses learn from its meteoric rise in popularity exposing weaknesses?

US Issues Guidance On North Korean Hackers, Offers $5M Reward – Expert Comment

The U.S. government has issued guidance on North Korean hacking activity in a joint advisory published by the U.S. Departments of State, Treasury, and Homeland Security, and the FBI. The advisory includes mitigation measures that the international community, network defenders, and the public can take to defend against state-sponsored hacking groups backed by North Korea […]

Comment: Microsoft Battles 3 Zero Days Under Active Exploit In April’s Patch Tuesday

Microsoft Patch Tuesday

Microsoft has released its April 2020 Patch Tuesday security updates, its first big patch update released since the work-from-home era truly got underway. This month sees the tech giant disclosing 113 vulnerabilities. Out of these, 19 are rated as critical, and 94 are rated as important. Crucially, four of the vulnerabilities are being exploited in […]

COMMENT: Privacy Experts Fear A Boom In Coronavirus Surveillance

As federal and state officials scramble to fight the novel coronavirus pandemic, experts are sounding alarms about the potential danger of increased surveillance programs they say could do long-term damage to privacy rights. Several nations, including South Korea and Israel, have used tracking data including cellphone location information and facial recognition tools to power their […]