Cyber Security Roundup for December 2020 – Security Boulevard

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, November 2020. Manchester…

View More Cyber Security Roundup for December 2020 – Security Boulevard
Microsoft confirms Chinese Iranian and Russian cyber-attacks on Biden and Trump campaigns

Microsoft confirms Chinese, Iranian, and Russian cyber-attacks on Biden and Trump campaigns

Today’s security threats have expanded in scope and seriousness. There can now be millions — or even billions — of dollars at risk when information…

View More Microsoft confirms Chinese, Iranian, and Russian cyber-attacks on Biden and Trump campaigns

How Biden’s cybersecurity expert shielded the campaign from hackers – Business Insider

As a cybersecurity expert for the Biden 2020 campaign, Jackie Singh was tasked with preventing hacks like the disastrous email leak that struck Hillary Clinton’s…

View More How Biden’s cybersecurity expert shielded the campaign from hackers – Business Insider

Google Chrome Update Gets Serious: Homeland Security (CISA) Confirms Attacks Underway – Forbes

Homeland Security cybersecurity agency says update Google Chrome as attackers home in on new security flaws. Department of Homeland Security urges users to update Google…

View More Google Chrome Update Gets Serious: Homeland Security (CISA) Confirms Attacks Underway – Forbes

Week in review: Cybersecurity workforce gap decreases, new issue of (IN)SECURE – Help Net Security

Here’s an overview of some of last week’s most interesting news and articles: Every employee has a cybersecurity blind spot80% of companies say that an…

View More Week in review: Cybersecurity workforce gap decreases, new issue of (IN)SECURE – Help Net Security
The Role of Access Control in Information Security

The Role of Access Control in Information Security – Hashed Out by The SSL Store™ – Hashed Out by The SSL Store™

Access control systems are everywhere and play a key role in identity and access management (IAM)— let’s break down the different types of access control…

View More The Role of Access Control in Information Security – Hashed Out by The SSL Store™ – Hashed Out by The SSL Store™
Spy-Site And Experian – Data Abuse

Spy-Site And Experian – Data Abuse – ISBuzz News

On the 29th October 2020, IsBuzzNews ran an article under their Expert Comments section on Experian and the UK’s Information Commissioner’s Office findings of the…

View More Spy-Site And Experian – Data Abuse – ISBuzz News