Guidelines to comply with PCI DSS 3.2 – Gemalto blog

Guidelines to comply with PCI DSS 3.2 – Gemalto blog

One of my previous blogs covered the latest changes in PCI DSS 3.2, which are mainly focused on the use of multi-factor authentication (MFA) and greatly expands the need for…

Raycom Buying CHNI Newspapers | Broadcasting & Cable

Raycom Media, which owns 65 TV stations, and 2 radio stations in 20 states, plans to merge with Community Newspaper Holdings Inc. (CNHI), which owns over 110 newspapers and publications…

Insteon and Wink home hubs appear to have a problem with encryption

Security researchers have discovered that two popular home automation systems are vulnerable to attacks. The Insteon Hub and Wink Hub 2 are designed to connect various home products and manage automation, and the…

IoT botnet Linux.ProxyM turns its grubby claws to spam rather than DDoS

An IoT botnet is making a nuisance of itself online after becoming a conduit for spam distribution. Linux.ProxyM has the capability to engage in email spam campaigns with marked difference…
Legacy networks holding back cloud and digital transformation – Help Net Security

Legacy networks holding back cloud and digital transformation – Help Net Security

A new global survey by Riverbed Technology, which includes responses from 1,000 IT decision makers across nine countries, revealed an incredible level of agreement that legacy infrastructures are holding back…