Google’s collaboration and productivity solution was already encrypting data, both when at rest and in transit, but the new feature is meant to provide additional control and ease of mind over the security of data. In addition to increasing the confidentiality of data, the feature also helps customers meet sovereignty and compliance requirements, as it…

In its advisory for the vulnerability — the bug currently does not have a CVE identifier — Mozilla described it as a “buffer overflow in depth pitch calculations for compressed textures.” The issue, reported by researchers Abraruddin Khan and Omair through Trend Micro’s Zero Day Initiative (ZDI), apparently only impacts Firefox running on Windows —…

Before the recent pandemic, many executives began appreciating the risks and opportunities associated with cybersecurity. A 2019 survey on cybersecurity priorities from Optiv Security found that 96% of CISOs are taking “a more strategic approach to cybersecurity,” and many were even willing to slow business development to account for cybersecurity-related risks. This was great news…

Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for oThe invention of the term “zero trust” is generally credited to former Forrester analyst John Kindervag more than a decade ago. Although it’s not new, the concept has received renewed interest and market traction…

While 91% of organizations were successful in increasing security as a result of adopting cloud services, it remains a top concern for many, a part two of an Aptum study reveals. The report identifies common security, compliance and governance challenges impacting organizations undergoing cloud transformation. The research reveals that 51% of survey respondents see security…

Welcome to the New Year, where we believe most organizations will continue to work through their digital transformation practices. These updated practices heavily impact IT and business leaders who need to expedite their migration to public clouds and in many situations minimize their physical data center footprint. With that comes numerous challenges, including data privacy…