Malware in PyPI Code Shows Supply Chain Risks

Malware in PyPI Code Shows Supply Chain Risks

A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories. The pace of…

View More Malware in PyPI Code Shows Supply Chain Risks
Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Millions of devices, from consumer products like printers and IP cameras to specialized devices used across organizations such as video conferencing systems and industrial control…

View More Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries
The Alibaba Experiment: How Machine Learning Increased Productivity By 70 Percent

The Alibaba Experiment: How Machine Learning Increased Productivity By 70 Percent

What Can Machine Learning and AI Bring to Warehouse Management? For industries that are truly open to embracing new developments in technology, machine learning and…

View More The Alibaba Experiment: How Machine Learning Increased Productivity By 70 Percent
6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Sixty-three percent of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon’s 2018 State of Endpoint Security…

View More 6 ways malware can bypass endpoint protection
How businesses plan to protect themselves against cyberattacks

How businesses plan to protect themselves against cyberattacks

Many organizations will spend more to shore up their defenses against cyber attacks this year, says business insurance provider Hiscox. Cyber attacks continue to rise…

View More How businesses plan to protect themselves against cyberattacks
How IoT Can Transform Retail

How IoT Can Transform Retail

Imagine a customer walks into your store. From the moment she enters, she gets information about products based on her personal tastes and the deals…

View More How IoT Can Transform Retail
Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links

Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links

Companies of all sizes and spanning all industries are aware of the security risks that are out there. They understand security best practices and invest…

View More Supply Chain Attacks Increase As Cybercriminals Focus On Exploiting Weak Links