Confidential computing is an emerging industry initiative and a form of technology that’s capable of isolating and encrypting data in use — or, data that’s in a processing phase within a central processing unit (CPU).
Latest News
Quantum hacking: What is it and should we be concerned?
While quantum hacking isn’t a major problem yet, with the continued development and research that large corporations, universities and even governments are putting into these powerful systems, a real quantum hacking threat may not be as far away as people think.
IT security vs OT security: What’s the difference?
In a perfect world, IT and OT security teams would work together and form a unified security strategy to protect physical and digital assets as a whole.
-
Big Data
The most in-demand cybersecurity skills in 2022
Cybersecurity has been and continues to be a huge concern for almost all organizations.
The pros and cons of AI in cybersecurity
AI has helped us accomplish a lot of good in the cybersecurity space. But, like most things, there is a list of disadvantages and adverse circumstances.
-
BYOD
Overcoming the increase in smartphone malware threats
Increased levels of smartphone malware threats presents new security challenges for individuals and businesses alike. Getting a good understanding of how phone malware works is the first step in keeping your data safe.
The resurgence of C as competition for Java
In May 2020, C surged to the No. 1 spot on the prominent TIOBE index – notably, ahead of Java – for the first time since 2015.
-
Consulting
Incident response: Critical security for the digital age
As the number of data breaches rises each year, organizations must re-evaluate their incident response strategies.
IoT devices and routers at risk due to BotenaGo malware
A new malware variant, BotenaGo, could potentially impact millions of IoT devices and routers after its authors published the source code online.
-
Mainframe Growth
Don’t forget about the Internet of Forgotten Things
As the Internet of Things has grown, so too have the number of things that are at risk of being forgotten. Find out why it’s important to not let “forgotten” devices slip through the cracks, and how to keep systems secure.
COVID-19 doesn’t have to disrupt your digital transformation
The decentralized and digital-reliant framework many organizations have shifted to as a result of the pandemic may actually be an ideal environment for digital transformation.
-
Uncategorized
Modernization presents challenges for Department of Labor
The Department of Labor has plans for a modernization project that might not take off.
-
Web Services
Cybersecurity podcast top picks
Stay up to date on the latest cybersecurity news and trends with this list of top podcasts.
NSA report provides latest recommendations for data security
When it comes to cybersecurity, nobody does it as well as the NSA. A report released by the U.S. intelligence agency offers plenty of advice for you to keep your network secure.