Ransomware Spiked Even Before WannaCry

26 May, 2017

Ransomware, a threat that has been in the news in recent weeks, grew aggressively during the first quarter of the year, according to Kaspersky Lab.

Cisco Extends Security Reach Out to the IoT Gateway

26 May, 2017

Cisco expects there will be 50 billion devices connected to IoT gateways by 2020. A huge percentage of those IoT devices are not able to defend themselves.

New Studies Renew Concerns of Insider Risks

25 May, 2017

It’s easy to get caught up with all of the other types of threats, but cybersecurity has to start at home, and that begins with better monitoring of the folks who have direct access to your network and data.

Barracuda Networks Looks to Ease Cloud Security Fears

24 May, 2017

Barracuda Networks wants to reduce the friction with making the move to the cloud by making it simpler for application developers to attach a firewall to any application being developed on a public cloud.

Red Hat Enhances RHEL Security and Automation

24 May, 2017

On the security front, RHEL 7.4 will provide support for disk encryption that can only be decrypted when that disk is attached to a specific network. Other new security-related features include full support for the OpenSSL HTTP/2.0 protocol.

Security Professionals React to Cybersecurity Executive Order

22 May, 2017

Our cybersecurity problems didn’t evolve overnight, nor will they be fixed with one EO. Time will tell how effective this is and how the administration builds on what it has begun.

Lessons of WannaCry: Back Up Your Data and Update Your Software

18 May, 2017

Now that the initial shock and awe reaction to WannaCry has subsided a bit, we can look at the ransomware a little more rationally and see what we can learn from it.

Thanks to WannaCry Ransomware, A Dark Day for Cybersecurity

15 May, 2017

WannaCry used an exploit named EternalBlue, which Microsoft patched back in March. Many organizations had not bothered to install the patch.

Study Finds Serious Security Concerns with Robots

12 May, 2017

Human behavior has a role to play in robot security. But robotic security is a very complicated issue.

Google Docs Phishing Scam Takes Advantage of Human Behavior

08 May, 2017

In the Google Docs phish, the hackers not only turned to behavior to gain an edge, they also used the legitimate functionality within Google's infrastructure to provide a proper user login.

Corsa Technology Disrupts DDoS Attacks

08 May, 2017

Corsa's GigaFilter, coupled with a Red Armor NSE 7000 appliance, intercepts most of the queries being launched by endpoints compromised by a bot before they ever get to a DNS server.

CA Technologies Employs Advanced Algorithms to Thwart Credit Card Fraud

04 May, 2017

As the ability to apply machine and deep learning algorithms against massive amounts of data in real time improves, the opportunity to commit fraudulent credit card transactions should be sharply reduced.

World Password Day Reminds Us to Examine Our Weakest Security Link

04 May, 2017

Good password management isn’t rocket science, but the truth is, we all get lazy about them. Sometimes we need a reminder.

Is the Hajime Botnet Friend or Foe?

01 May, 2017

Nobody is sure if the new ioT botnet entrant, Hajime, aims at causing destruction or at preventing Mirai and other botnets from doing so.

Phishing Continues to Stand Out as a Primary Attack Vector in Verizon 2017 DBIR

01 May, 2017

Doesn’t it so often seem that cyberattacks come back to phishing and social engineering?

Chipotle PoS Part of Rising Data Breach Problem for Retail Industry

27 Apr, 2017

Even with credit card payments being all but mandatory in retail, PCI compliances, and the focus on EMV chip adoption, companies are still failing to keep credit card data secure.

10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

26 Apr, 2017

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions.

Organizations Aren’t Limiting Access to Sensitive Data

26 Apr, 2017

If you want to keep your data from being compromised, you have to protect your data. That includes knowing where sensitive data is stored and knowing who has access to it.

Eastwind Networks Applies Machine Learning to DNS to Improve Security

26 Apr, 2017

Any time new malware is encountered, IT can then treat the Eastwind DNS as a system of record to identify who else in their organization might have been infected by visiting the same site.

Varonis Annual Survey: A Lot of Companies Are Taking Unknown Terminal Risks

25 Apr, 2017

With state-level threats hovering over almost every country, the level of exposure creates issues at a national level and the potential for a single connected trusted company to become the critical path for a nation-level attack.

1|2 | 3 | 4 | 5 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.