by Liquid Video Technologies | Feb 7, 2020 | Access Control, Cloud-Based Access Control, Cybersecurity, News, Security, Technology News
The National Security Agency (NSA) has released an information sheet with guidance on mitigating cloud vulnerabilities. NSA identifies cloud security components and discusses threat actors, cloud vulnerabilities and potential mitigation measures. The document divides...
by Liquid Video Technologies | Feb 5, 2020 | Access Control, Cybersecurity, Data Breaches, News, Security, Technology News
New research finds that 97 out of 100 the world’s largest airports have security risks related to vulnerable web and mobile applications, misconfigured public cloud, Dark Web exposure or code repositories leaks. The report from web security company ImmuniWeb is...
by Liquid Video Technologies | Jan 29, 2020 | Access Control, Cybersecurity, Data Breaches, News, Security, Technology News
If you have ever contacted Microsoft for support in the past 14 years, your technical query, along with some personally identifiable information might have been compromised. Microsoft today admitted a security incident that exposed nearly 250 million “Customer...
by Liquid Video Technologies | Jan 27, 2020 | Access Control, Cybersecurity, News, Security, Technology News
Testing security controls is the only way to know if they are truly defending your organization. With many different testing frameworks and tools to choose from, you have lots of options. But what do you specifically want to know? And how are the findings relevant to...
by Liquid Video Technologies | Jan 24, 2020 | Access Control, Cybersecurity, News, Security, Technology News
Google is willing to award up to $1.5 million to hackers who can successfully hack its Titan M security chip on the company’s Pixel devices as part of an expansion of its Android bug-bounty program unveiled this week. The company revealed increased payouts to its...
by Liquid Video Technologies | Jan 22, 2020 | Access Control, Cybersecurity, News, Security, Technology News
Several toys that were tested have been found lacking authentication measures, opening them up to an array of insidious attacks. Various connected toys for children – hot off the shelves from this holiday shopping season – have been found with deep-rooted security...
Recent Comments