Smarter Security, the intelligent entrance controls company, announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorized side-by-side entry through a turnstile. Sidegating is a growing security issue as changing regulations and customer demands for increased pedestrian and wheelchair user comfort dictate the need for wider turnstiles. If a lane is wide enough to comfortably fit a wheelchair, it is also wide enough to fit two pedestrians side-by-side. Until now, … More
The post Smarter Security’s new optical technology to prevent sidegating appeared first on Help Net Security.
Cohesity announced a new application called Cohesity Runbook. Cohesity Runbook provides organizations with a new automation design canvas that makes it incredibly simple and formulaic for enterprises to move workloads systematically between on-premises data centers and the public cloud – a critical need as more and more organizations rely on the cloud for everything from dev/test to security to disaster recovery. The Cohesity Runbook application, available through the Cohesity Marketplace, automates the process of moving … More
The post Cohesity Runbook enables enterprises to systematically move workloads to the cloud appeared first on Help Net Security.
A vulnerability in legacy Iomega and LenovoEMC network-attached storage (NAS) devices has led to many terabytes of potentially sensitive data being accessible to anyone via the Internet. About Iomega and LenovoEMC Iomega Corporation was acquired in 2008 by EMC. In 2013, Iomega became LenovoEMC – a joint venture between Lenovo and EMC Corporation – and Iomega’s products were rebranded under the new name. Iomega’s and LenovoEMC’s storage products were aimed at small and medium-sized businesses. … More
The post Flaw in Iomega, LenovoEMC NAS devices exposes millions of files on the Internet appeared first on Help Net Security.
More than 4 in 5 IT teams are involved in security efforts, and a majority of them report an increase of at least 25 percent in time spent on these efforts over the past 12 months, according to Viavi. The most striking conclusion is that network-based conversation wire data has become the top data source for security incidents, with its use tripling, demonstrating that threat levels have driven enterprises to seek the most reliable forensic … More
The post Over 80% of network teams play a role in security efforts appeared first on Help Net Security.
It’s no secret that attackers traditionally go after low-hanging fruit when hacking a system. Historically, this has meant targeting user applications, and, for deeper persistence, the operating system (OS) kernel to gain control. But, as OS security has advanced, it’s become more difficult to compromise an OS with any kind of persistent kernel rootkit. As a result, hackers (and researchers) have moved below the OS level and are now targeting firmware – most notably the … More
Businesses worldwide are gaining control of previously unmonitored and unsupported cloud applications and devices, known as shadow IT, that lurk in their IT environments, according to the 2019 Duo Trusted Access Report. The average number of organizations protecting cloud apps with Duo surged 189 percent year-over-year, indicating that enterprises are catching up with the explosion of cloud use and shadow IT in the workplace. In addition, the frequency of out-of-date devices has dropped precipitously, hardening … More
The post Enterprises catching up with the explosion of cloud use and shadow IT in the workplace appeared first on Help Net Security.