For companies moving to public or even multicloud environments, key management and encryption — of data in motion, at rest and even in use — are top of mind. Organizations consider certificate management and key management a commodity, and many seem to struggle to get this right.
WASHINGTON — President Donald Trump is leaning in favor of a new Pentagon plan to keep a small contingent of U.S. troops in eastern Syria, perhaps numbering about 200, to combat the Islamic State group and block the advance of Syrian government and Russian forces into the region’s coveted oil fields, a senior administration official said Sunday.
Civilian UAVs are used increasingly frequently for photo and video shooting, cargo delivery, search-and-rescue operations, and other purposes. In the interests of safety — of both the drones and their surroundings — some countries have already introduced rules and restrictions on their use. Alas, not all UAV owners know or follow them. And, like any electronic devices, drones can sometimes get out of hand. What are the potential consequences? Here are some examples.
Today, hundreds of civil drone models are available for sale — from fairly simple toys to impressive aircraft built to carry substantial weight. Most of them are used for entertainment or aerial video. But, as is the case with almost all technologies, sooner or later someone puts them to malicious use. That creates demand for systems to get rid of unwelcome aerial presence. Demand, in turn, breeds supply, and our enthusiasts have developed a solution called Kaspersky Antidrone.
It is well-known that people are the most important element of cybersecurity, yet many security awareness training programs fail to deliver the expected results. Why do employees fall into the same traps over and over, despite the regular training that companies put their users through?
Global software companies are increasingly being targeted for disruptive attacks, cyber-espionage and even nation-state level sabotage, as evidenced by the many reports of data breaches and supply chain attacks over the last few years. At Avast, we constantly work hard to stay ahead of the bad guys and to fight off attacks on our users. It is therefore not so surprising that we ourselves could be a target.