At the G7 Summit in Biarritz, France, G7 leaders have agreed on a Strategy for an open, free and secure digital transformation. The document starts by outlining the role of digital technologies in empowering individuals and communities and draws attention to the risks posed by online abuse against women, minorities and vulnerable users.
The Russian Armed Forces are forming special units, whose task will be to search for and neutralise virtual threats to the ‘military Internet’.
Microsoft Threat Intelligence Center published a post according to which in April this year security researchers in Microsoft discovered that attempts were made to compromise popular IoT devices (a VOIP phone, an office printer, and a video decoder) across multiple customer locations.
The US National Institute of Standards and Technology (NIST) published a draft guide titled NISTIR 8259 - Core Cybersecurity Feature Baseline for Securable IoT Devices: A Starting Point for IoT Device Manufacturers.
Cybersecurity Tech Accord signatories agree to implement vulnerability disclosure policies by the end of the year
Since its launch, one of the main commitments of the Cybersecurity Tech Accord was the need for governments and industry to adopt vulnerability disclosure policies (VDP).
During the International Conference on Cyber Security at Fordham University, Attorney General William Barr during his keynote address tried to reassure that total encryption and privacy is a wicked problem to protect society from criminal activity.
A study conducted by researchers from the University of Illinois at Urbana-Champaign, Stanford University, and Avast Software, analysed the use of Internet of things (IoT) devices in homes around the world.
Huawei 2018 Sustainability Report: Bring digital to every person, home and organisation for a fully connected, intelligent world
Huawei published its 2018 sustainability report titled bring digital to every person, home and organisation for a fully connected, intelligent world which elaborates on Hua