by Liquid Video Technologies | Dec 25, 2020 | Cybersecurity
Small and medium organizations can face a variety of IT challenges: insufficient funding, constantly evolving technologies, growing legal and regulatory requirements, and a lack of skilled and trained IT employees. Oftentimes, these enterprises rely on third-parties...
by Liquid Video Technologies | Dec 23, 2020 | Cybersecurity, News, Security, Technology News
Cisco has once again fixed four previously disclosed critical bugs in its Jabber video conferencing and messaging app that were inadequately addressed, leaving its users susceptible to remote attacks. The vulnerabilities, if successfully exploited, could allow an...
by Liquid Video Technologies | Dec 21, 2020 | Access Control, Cybersecurity, Security
Safeguarding an organization from cybercrime has become vastly more challenging given how digitized and, as a result, interconnected the world has become. Adding complexity to this already daunting scenario is the fact organizations have become perimeter-less, often...
by Liquid Video Technologies | Dec 18, 2020 | Cybersecurity, Data Breaches, News, Security Breach
Two popular Android apps from Chinese tech giant Baidu were temporarily unavailable on the Google Play Store in October after they were caught collecting sensitive user details. The two apps in question—Baidu Maps and Baidu Search Box—were found to collect device...
by Liquid Video Technologies | Dec 16, 2020 | Cybersecurity, Network Security, Security
At present, web applications have become the top targets for attackers because of potential monetization opportunities. Security breaches on the web application can cost millions. Strikingly, DNS (Domain Name System) related outage and Distributed denial of service...
by Liquid Video Technologies | Dec 11, 2020 | Cybersecurity, Data Breaches, Hacker, Security, Security Breach, zero trust
Why zero-trust security for email? It has been 20 years since sender identity fraud shifted to the world of email and became known as phishing. In the early days, email threats were largely content-centric and usually included a malicious link or attachment to trick a...
Recent Comments