by Liquid Video Technologies | Jan 15, 2020 | Access Control, Cybersecurity, Data Breaches, News, Security, Technology News
It has to be said, that it’s not going to get easier to handle IT security. We are living in the world of exploding possibilities and the IT environment is becoming increasingly complex. In parallel, the IT security landscape is also growing. IT security departments...
by Liquid Video Technologies | Jan 13, 2020 | Access Control, Cybersecurity, Data Breaches, News, Security, Security Breach, Technology News
A database containing more than 267 million Facebook user IDs, phone numbers and names was left exposed on the web for anyone to access. According to Comparitech, Bob Diachenko, security researcher, uncovered the Elasticsearch cluster and believes the trove of data is...
by Liquid Video Technologies | Jan 10, 2020 | Access Control, Cybersecurity, Data Breaches, News, Security, Technology News
The Information Security Forum (ISF), a resource for executives and board members on cyber security and risk management, has announced the organization’s outlook for the top global security threats that businesses will face in 2020. Key threats for the coming year...
by Liquid Video Technologies | Jan 8, 2020 | Access Control, Cybersecurity, News, Security, Technology News
The wheels of 2020’s biggest cyber security threats have already been set in motion. Mobile, the cloud and artificial intelligence, to name a few, are trends that will continue to be exploited by criminals. Couple that with the rapid growth of software development and...
by Liquid Video Technologies | Jan 6, 2020 | Access Control, Cybersecurity, News, Security, Technology News
Advanced persistent threats (APTs) have emerged to be legitimate concerns for all organizations. APTs are threat actors that breach networks and infrastructures and stealthily lurk within them over extended spans of time. They typically perform complex hacks that...
by Liquid Video Technologies | Dec 30, 2019 | Access Control, Cybersecurity, Data Breaches, Network Security, News, Security, Security Breach, Technology News
Mobile computing, cloud applications and tele-work have all combined to erode the traditional corporate security perimeter — and, in doing so, have largely transferred the attack surface to end-user devices. Each endpoint is now its own perimeter in today’s Zero Trust...
Recent Comments