• Wed. May 13th, 2026

Christina Antonelli

Connecting the World, Technology in Time

Information Security

  • Home
  • Identity Management and Information Security News for the Week of August 2; Camelot Secure, Zendata, BeyondID, and More

Identity Management and Information Security News for the Week of August 2; Camelot Secure, Zendata, BeyondID, and More

The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of August 2. This curated list features identity…

‘Sitting Ducks’ Exposes Millions Of Domains To Hijacking

A recently discovered vulnerability in the Domain Name System (DNS), dubbed ‘Sitting Ducks,’ has left millions of domains susceptible to hijacking. This attack vector, actively exploited since 2019, enables threat…

Event-driven optical encryption advances information security through neuromorphic imaging

Harnessing event sensors for neuromorphic encryption and physics-informed deep learning for image decryption. Credit: Advanced Photonics Nexus (2024). DOI: 10.1117/1.APN.3.5.056002 In an era where the internet connects virtually every aspect…

Inside Minnesota’s Dollar-Driven Cyber Defense Tool

Money talks, especially when it comes to cybersecurity. In Minnesota, IT leaders are revolutionizing their approach by quantifying cyber risk in financial terms, enabling more informed decision-making across state agencies.…

Court in SolarWinds Case Blows Down SEC’s Cyber Enforcement Authority | Insights

The U.S. District Court for the Southern District of New York on July 18, 2024, dismissed most of the SEC’s landmark cyber enforcement litigation against SolarWinds Corp. (SolarWinds or the…

For security leaders, AI is a mounting peril and an emerging shield

The already heavy burden born by enterprise security leaders is being dramatically worsened by AI, machine learning, and generative AI (genAI). Malware, phishing, and ransomware are fast-growing threats given new…