Unitrends Employs Predictive Analytics to Detect Ransomware

23 Mar, 2017

Thanks to the rise of ransomware, data protection has quickly moved up as an IT priority.

Where Is Cybersecurity Headed in 2019?

23 Mar, 2017

Even if we think we know what’s coming, we still aren’t really prepared for it. Our security systems are often built to focus on known attack methods, not for future cybersecurity threats.

Android Security: Progress Amid Continuing Challenges

22 Mar, 2017

Google is making progress in its Android security efforts and significant dangers exist. The two facts are not contradictory. Hopefully, the balance will continue to tilt toward progress and away from insecurity.

What Blockchain Can Do for the Enterprise

21 Mar, 2017

Before the enterprise becomes too dependent on blockchain, it would be wise to make sure it can provide a trusted ledger of digital events both now and into the future.

Secret Service Laptop Theft Should Serve as Security Wake-Up Call

20 Mar, 2017

The Secret Service theft is a reminder of how common the disappearance of our devices can be and the risks that are involved.

Interconnect 2017: IBM and Securekey Move to Corner Financial Transaction Market

20 Mar, 2017

Innovative use of Blockchain could do some fascinating things to how we do transactions. Even things like paying taxes or voting could be dramatically changed, because at the heart of this is a validated identity.

Twitter Hack Shows Dangers of Third-Party Access

16 Mar, 2017

Twitter has serious flaws that have led to hacked accounts that were then taken over by bad actors.

NodeSource Addresses Compliance and Security for Node.js Apps

16 Mar, 2017

NodeSource announced NodeSource Certified Modules, a registry through which it certifies that various Node.js modules are stable and secure.

Exit Interview Key to Help Prevent Data Loss, CEO Says

15 Mar, 2017

Ron Faith, president and CEO of Datacastle, a data security and backup technology provider in Seattle, is such an ardent believer in exit interviews that he personally conducts every one of them at his own company.

Verizon’s Data Breach Digest Uses Case Studies as Security Response Teaching Tools

14 Mar, 2017

The Verizon Data Breach Digest highlights 16 case studies based on real-world data breach response activities and the lessons learned by the Verizon RISK Team.

The Android Supply Chain Is Not Secure

13 Mar, 2017

The idea that supply chains to corporate customers are not secure is a new and distressing take on Android security vulnerabilities.

CA Technologies Aims to Enhance App Security via Veracode Acquisition

13 Mar, 2017

The degree to which developers address security issues at the front end of the development process affects everything from how secure the application is to the amount of risk being assumed by the organization that deploys it.

Cybersecurity Pros Don’t Trust Federal Government on Security. Will They Trust States?

13 Mar, 2017

Only 17 percent of security pros believe the government is able to protect itself from cyberattacks. Security professionals are also concerned about the rise in nation-state attacks.

CIA Breach Shows Lack of Security in IoT

09 Mar, 2017

We must discuss the ramification to businesses and their employees and customers: the IoT security risks.

Data Security Lessons from the DNC Hack

07 Mar, 2017

Christy Wyatt, CEO of Dtex, and Robby Mook, former campaign manager for Hillary Clinton, discuss how the DNC hack showed the real-life consequences that come with a data breach.

Breach Fallout Can Linger Years After the Initial Incident

06 Mar, 2017

News about long-running consequences of Yahoo and Gmail breaches should worry IT security professionals.

Vulnerabilities Run Rampant in Robots

03 Mar, 2017

The machines indeed may be able to take over, as machines are abetted by hackers.

Accenture Partners with Thales on Blockchain Security

03 Mar, 2017

Thales CTO for e-Security Jon Geater says that, in time, both Accenture and Thales expect to see blockchain software being applied across a range of vertical industries.

Mismatch in Incentives Gives Cybercriminals an Edge

02 Mar, 2017

One of the reasons cybercriminals have the advantage is because the incentives between the attackers and the defenders are mismatched.

1|2 | 3 | 4 | 5 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.