article thumbnail

Runa Sandvik’s new startup Granitt secures at-risk people from hackers and nation states

TechCrunch

Journalists and activists are increasingly targeted by the wealthy and resourceful who seek to keep the truth hidden, from nation-state aligned hackers hacking into journalist’s inboxes to governments deploying mobile spyware to snoop on their most vocal critics. That’s definitely still a part of what I do.

Spyware 308
article thumbnail

Radar trends to watch: August 2021

O'Reilly Media - Ideas

Good practices for authentication, backups, and software updates are the best defense against ransomware and many other attacks. DID is a new proposed form of decentralized digital identity that is currently being tested in the travel passports with COVID data being developed by the International Air Transport Association.

Trends 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Breaking Down the NASCIO Top 10 for 2023

Palo Alto Networks

But, with data traveling across the IT landscape, it is critical to implement consistent security configurations across your on-premises, cloud and SASE environments. Multi-factor authentication (MFA) is critical. Palo Alto Networks offers solutions, such as our ML-Powered NGFW for 5G.

article thumbnail

Improving IT Security in a World Filled With Hackers

Samanage

Way back in the stone age of five years ago, cybersecurity threats were primarily one of five types: trojans, unpatched software, phishing attacks, network traveling worms, or advanced persistent threats. Creating a Secure IT Platform for Employees.

Spyware 40
article thumbnail

The Future of Security

O'Reilly Media - Ideas

User identities could no longer be confined to a company’s internal perimeter, and with employees needing access to business data and numerous SaaS applications while working remotely or on business travel, it became impossible to control access centrally. Every device user and network flow is authenticated and authorized.

Mobile 98