• img January 03, 2018

Intel In Security Hot Seat Over Serious CPU Design Flaw

Intel is grappling with a processor design flaw impacting CPUs used in Linux, Windows and some macOS systems.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/intel-in-security-hot-seat-over-serious-cpu-design-flaw/

Read More
  • img January 03, 2018

Upcoming patches for security flaw in Intel processors expected to slow down computers

Windows users whose PCs run on Intel processors can apparently expect their computers to slow down after next Tuesday. In fact, all computers using modern Intel chips – whether they run Windows, Linux or macOS – are expected to suffer a performance hit in the coming days. The reason for this unwelcome change is a […]

Read More
  • img January 03, 2018

2018: The year of the NIS Directive

In 2017 the GDPR buzz reached peak intensity, even in the cybersecurity community. It practically drowned out any mentions of another important upcoming EU law: The Network and Information Security (NIS) Directive. The NIS Directive is the first piece of EU-wide legislation on cybersecurity and, by May 9, 2018, all EU member countries will have […]

Read More
  • img January 03, 2018

Despite cybersecurity concerns, many consumers don’t protect themselves

Despite awareness of the need for cybersecurity, many consumers are not taking proactive steps to keep their personal information protected from identity theft. With the increased volume of attacks and breaches, 61% of consumers surveyed claimed that they are more worried about cybersecurity today than they were five years ago. Recent McAfee research reveals that […]

Read More
  • img January 03, 2018

Global Security Threats You Need to Know About in 2018

In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function, since new […]

Read More