Topic: security standards

  • Chamberlain Locks Out Smart Home Garage Door Integrations Again

    Chamberlain Locks Out Smart Home Garage Door Integrations Again

    Chamberlain Group's new Security+ 3.0 platform blocks third-party integrations, forcing users into its ad-filled MyQ ecosystem and paid partner subscriptions. The company cites enhanced security and modernization, but critics view the move as a vendor lock-in strategy that renders previous commun...

    Read More »
  • DataLocker Enhances Security with DL GO & MySafeConsole

    DataLocker Enhances Security with DL GO & MySafeConsole

    DataLocker has launched the DL GO encrypted USB drive and MySafeConsole cloud platform, offering enterprise-level security features at an accessible price for individuals and small businesses. The DL GO drive uses AES-256 XTS hardware encryption, supports biometric authentication, and has a rugge...

    Read More »
  • UK Unveils Major Plan to Fortify Public Sector Cybersecurity

    UK Unveils Major Plan to Fortify Public Sector Cybersecurity

    The UK government is investing over £210 million in a new cybersecurity initiative, establishing a central Government Cyber Unit and mandating minimum security standards to protect essential public services. The strategy includes a public-private Software Security Ambassador Scheme and follows ne...

    Read More »
  • LexisNexis Opens APAC Data Hub in Malaysia to Boost Fraud Defense

    LexisNexis Opens APAC Data Hub in Malaysia to Boost Fraud Defense

    LexisNexis Risk Solutions has launched a new APAC data hub in Malaysia to enhance digital identity protection and fraud prevention across the Asia-Pacific region, supporting secure business operations. The facility will process data for key APAC markets, improving system performance and transacti...

    Read More »
  • Is Solar Power Overwhelming the Grid?

    Is Solar Power Overwhelming the Grid?

    Insecure domestic solar power systems pose a new threat to national electricity grids, as vulnerable control devices could be manipulated to cause synchronized power disruptions, according to a recent report. Common IoT devices like smart cameras are being exploited for privacy invasions, enablin...

    Read More »
  • Ro's CISO: Securing Telehealth Data Flows

    Ro's CISO: Securing Telehealth Data Flows

    The rapid growth of telehealth creates a complex data flow across cloud and third-party platforms, demanding a dynamic, continuous security strategy that goes beyond static compliance to protect patient privacy. A core vulnerability is the frequent lack of universal data classification, making it...

    Read More »
  • TechnologyOne Achieves Global AI Trust with ISO 42001 Certification

    TechnologyOne Achieves Global AI Trust with ISO 42001 Certification

    TechnologyOne has achieved ISO 42001 certification, reinforcing its commitment to responsible AI and ethical practices to build customer trust in rapidly advancing technology. The certification, attained in just five months, positions the company as a leader in balancing innovation with risk mana...

    Read More »
  • Helios: The AI OS for Public Policy Experts

    Helios: The AI OS for Public Policy Experts

    Helios, founded by former government officials, combines AI with policy expertise to create Proxi, an AI-native platform streamlining legislative research, stakeholder mapping, and policy drafting for public and private sectors. Backed by $4 million in seed funding, Helios' Proxi platform offers ...

    Read More »
  • MessageXchange Reappointed as NSW Government's E-Invoicing Partner

    MessageXchange Reappointed as NSW Government's E-Invoicing Partner

    The New South Wales Government has renewed its partnership with MessageXchange, confirming it as the dedicated e-invoicing provider after a review by NSW Treasury, continuing a collaboration that began in 2020. Peppol e-invoicing enables secure, direct invoice transfers between software systems, ...

    Read More »
  • Future-Proof Your Career With This Power Move

    Future-Proof Your Career With This Power Move

    Participating in standards organizations provides a strategic career edge by offering advanced insight into future technologies, expanding your professional network, and positioning you at the forefront of industry innovation. Involvement is valuable for a wide range of professionals, not just en...

    Read More »
  • Top 10 Cybersecurity Stories of 2025: The Year's Biggest Breaches & Threats

    Top 10 Cybersecurity Stories of 2025: The Year's Biggest Breaches & Threats

    Major cybersecurity vendors withdrew from the MITRE ATT&CK Evaluations in 2025, citing the tests' growing complexity and shift toward marketing, prompting plans for reform ahead of the 2026 cycle. A widespread proxy network compromised thousands of vulnerable IoT devices to facilitate malicious a...

    Read More »
  • CODE81, Moro Hub, Liferay Partner to Boost UAE Digital Experiences

    CODE81, Moro Hub, Liferay Partner to Boost UAE Digital Experiences

    A strategic alliance between Moro Hub, Liferay, and CODE81 aims to accelerate the UAE's digital transformation by combining global technology leadership, regional implementation expertise, and robust hosting infrastructure. The partnership supports the UAE's goals to become a leading digital hub,...

    Read More »
  • Datadog Secures IRAP Protected Status in Australia

    Datadog Secures IRAP Protected Status in Australia

    Datadog has achieved IRAP Protected status in Australia, certifying its compliance with stringent security standards for handling sensitive workloads in the public sector and regulated industries. The certification covers Datadog's full suite of observability and security tools, including Infrast...

    Read More »
  • Google Pixel 10 Gets AirDrop Thanks to EU Apple Ruling

    Google Pixel 10 Gets AirDrop Thanks to EU Apple Ruling

    Google has introduced cross-platform AirDrop functionality to its Pixel 10 series, enabling secure file transfers between Pixel devices and iPhones, largely due to European Union regulatory requirements. The EU's Digital Markets Act forced Apple to adopt open wireless standards like Wi-Fi Aware, ...

    Read More »
  • Achieve SOC 2 & ISO 27001 Backup Compliance

    Achieve SOC 2 & ISO 27001 Backup Compliance

    SOC 2 and ISO 27001 require a systematic approach to data backup, treating it as verifiable proof of operational integrity and security commitments, not just disaster recovery. SOC 2 is a U.S. audit framework focused on five Trust Services Criteria, with security as mandatory, while ISO 27001 is ...

    Read More »