Tag: F-Secure
-
F-Secure spins out new enterprise security business: WithSecure
F-Secure’s enterprise-facing business will have a new brand – WithSecure – and a sharpened focus when the company splits into two …
-
F-Secure rebrands its corporate security business under the new name
The corporate security business of F-Secure relaunches as a new brand that shares the company’s new name WithSecure. To benefit from the …
-
F-Secure Rebrands as WithSecure, Spins Off Consumer Products
Attempting to catch up with CrowdStrike, Microsoft, and Trend Micro, the Helsinki-based endpoint-protection firm “de-merges” its …
-
F-Secure announces name of corporate business ahead of company split
F-Secure Corp. today revealed its new brand for its corporate security business ahead of a move to split its business into two companies …
-
The simple secret to app security? Time
There is one simple secret to building secure applications. Unfortunately, that secret is …
-
Top threats for the financial sector
The potential financial, operational, and reputational impact of ransomware makes it the top threat facing financial services …
-
What is fueling digital anxiety when working remotely?
Working from home has spiked since the onset of the Covid-19 pandemic in March of 2020. This effort to reduce health risks may have limited …
-
People working in IT related roles equally susceptible to phishing attempts as the general population
Phishing emails that mimic HR announcements or ask for assistance with invoicing get the most clicks from recipients, according to a study …
-
Log4Shell is a dumpster fire that should have been avoided
On Thursday, December 9, 2021, my young, Minecraft-addicted kids were still completely oblivious of the Log4j vulnerabilities in their …
-
How can AI be made more secure and trustworthy?
How can AI be made more secure and trustworthy? The first step is to understand and acknowledge the existence of potential …
-
Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
Due to the extraordinary widespread use of the open-source Apache Log4j library, the saga of the Log4Shell (CVE-2021-44228) vulnerability …
-
Visiting a booby-trapped webpage could give attackers code execution privileges on HP network printers
Tricking users into visiting a malicious webpage could allow malicious people to compromise 150 models of HP multi-function printers, …
●●●