Security

Articles

Ransomware Spiked Even Before WannaCry

Ransomware, a threat that has been in the news in recent weeks, grew aggressively during the first quarter of the year, according to Kaspersky Lab. More >

Cisco Extends Security Reach Out to the IoT Gateway

Cisco expects there will be 50 billion devices connected to IoT gateways by 2020. A huge percentage of those IoT devices are not able to defend themselves. More >

New Studies Renew Concerns of Insider Risks

It’s easy to get caught up with all of the other types of threats, but cybersecurity has to start at home, and that begins with better monitoring of the folks who have direct access to your network and data. More >

Barracuda Networks Looks to Ease Cloud Security Fears

Barracuda Networks wants to reduce the friction with making the move to the cloud by making it simpler for application developers to attach a firewall to any application being developed on a public cloud. More >

Red Hat Enhances RHEL Security and Automation

On the security front, RHEL 7.4 will provide support for disk encryption that can only be decrypted when that disk is attached to a specific network. Other new security-related features include full support for the OpenSSL HTTP/2.0 protocol. More >

Security Professionals React to Cybersecurity Executive Order

Our cybersecurity problems didn’t evolve overnight, nor will they be fixed with one EO. Time will tell how effective this is and how the administration builds on what it has begun. More >

More Articles >

Interviews

CEO Shares Insights on Preventing Data Loss, Handling Data Breaches

Datacastle CEO Ron Faith discusses mitigating the risk around employees walking out the door with sensitive company data.

More >

Citrix CSO: Treating IT Security Symptoms Is the Problem, Not the Solution

Stan Black, chief security officer at Citrix Systems, says companies need to be focused on data analytics, machine learning, and an understanding of individuals’ roles.

More >

‘Security Operations Center’ Approach Is Fail-Safe Against Cyberattacks, CEO Says

A key line of defense will take the form of “security operations centers,” or SOCs. And with SMBs expected to be targeted more aggressively by the bad guys, making the SOC approach affordable is going to be essential.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series uses 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Security95-290x195.jpg Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships....

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content sec...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.