Cybersecurity

Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases

Apr 23, 2024NewsroomEnd-to-End Encryption / Privacy European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due to end-to-end encryption (E2EE). They called on the industry and governments to take urgent action to ensure public safety across social media platforms. “Privacy measures currently being rolled out, […]

Cybersecurity

German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies

Apr 23, 2024NewsroomCounterintelligence / National Security German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full names of the defendants were not disclosed by the Office of the Federal Prosecutor (aka Generalbundesanwalt), but it includes Herwig F., Ina F., and Thomas R. “The suspects are strongly […]

Cybersecurity

Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity – Help Net Security

Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security practitioners cut through the noise and understand console behavior in their environment. “Infrastructure as code has replaced a lot of the need for console access for many organizations, but there are still plenty of instances […]

Data Center

What Is GNOME?

What is GNOME (GNU Network Object Model Environment)? GNOME (GNU Network Object Model Environment) is a graphical user interface (GUI) and set of computer desktop applications for Linux operating system (OS) users. It’s intended to make a Linux OS easy to use for nonprogrammers. GNOME generally corresponds to the Windows desktop interface and its most […]

Cybersecurity

Majority of businesses worldwide are implementing zero trust, Gartner finds

Dive Brief: Almost two-thirds of organizations across the globe have either fully or partially implemented zero-trust strategies, according to a report released Monday by Gartner based on a survey of 303 security leaders.  Of organizations that have fully or partially implemented zero trust, 4 in 5 have strategic metrics to measure their success. Of those, […]