Holiday-Related Studies Find Customers Will Go Elsewhere When Security Fails

30 Nov, 2017

The holiday shopping season puts a special emphasis on retail outlets and security, but all businesses should take note.

Pay Attention to SD-WAN Security

30 Nov, 2017

SD-WANs bring tremendous potential benefits to telecommunications networks. They are a new and relatively untested approach, however.

McAfee Acquires Skyhigh Networks to Gain CASB

27 Nov, 2017

McAfee is betting the focal points for enforcing security will increasingly shift to the cloud on one end of the wire and endpoints on the other.

Uber’s Massive Security Failure

27 Nov, 2017

It is not hyperbole to say that this was an all-round massive failure by Uber.

Security Risks Facing the Critical Infrastructure

21 Nov, 2017

As in any other type of network infrastructure, the risks come because the bad guys know where the fault lines are. The critical infrastructure is not any different.

Zeus-Variation Terdot Targets Social Platforms

20 Nov, 2017

While Terdot is technically a banker trojan, like the original Zeus, this variation has the ability to spy on social media and email platforms.

Smart Guns Are a Smart Solution, But Not for Most Mass Shootings

15 Nov, 2017

Technology can play a big role in reducing gun violence. Unfortunately, it does not seem to be the answer for the highest profile manifestation of the problem.

John Chen: Messages from the BlackBerry Keynote

14 Nov, 2017

Follow the BlackBerry focus on security because it will help you properly prioritize the classes of system that are mostly likely to be breached.

Good News/Bad News for Security Protection

13 Nov, 2017

Was the Equifax breach finally the wake-up call that organizations needed?

Bracket Computing Bolsters Server Security

09 Nov, 2017

Bracket Computing Server Guard makes use of segmentation to prevent a compromise of one operating system environment from being able to move laterally across the rest of the enterprise.

Updating Productivity Suites as Important as Updating Operating Systems

06 Nov, 2017

Like with new operating systems, updating new productivity suites is costly and time consuming, but still crucial.

The Telecom Ecosystem Is Taking the KRACK Attack Seriously

01 Nov, 2017

There is good news in that KRACK, according to the experts, is not too difficult to fix.

The Risks of Messaging Apps in BYOD

30 Oct, 2017

Messaging in the workplace is not going to stop, especially if your organization allows BYOD. So what can you do to make it more secure?

AttackIQ Enhances Cybersecurity Attack Simulation Platform

30 Oct, 2017

AttackIQ FireDrill provides a mechanism through which organizations can validate how good their security processes are today.

Delaying Windows 10 Rollouts Is Playing Russian Roulette with Your Employees

27 Oct, 2017

Microsoft is aggressively pushing out Windows 10 patches, because the speed at which the attackers are adjusting their attack vectors is unprecedented.

Lenovo, Intel and the FIDO Alliance Finally Move to Kill Off the Password

26 Oct, 2017

Thanks to Lenovo, Intel and FIDO, passwords finally may be on their way to becoming well and truly dead.

Critical Infrastructure Under Attack from APTs

26 Oct, 2017

Spearphishing emails are specifically designed to target industrial control systems personnel with malicious Microsoft Word attachments masked as legitimate files, including resumes and policy documents.

New Tech Proves Helpful in Emergencies

26 Oct, 2017

The wildfires in California provide real evidence that new tools are helpful in efforts to save lives and limit property damage.

Symantec Bolsters Endpoint Security

25 Oct, 2017

Symantec can deliver a more robust set of cybersecurity defenses to the endpoint without increasing the total amount of processing horsepower needed to be devoted to security software.

Understanding Cybersecurity Past to Address Cybersecurity Future

23 Oct, 2017

Cybercriminals aren’t reinventing new malware or attack vectors; they are modernizing them to circumvent more sophisticated security systems and more security-aware users.

« Prev |  1 | 2|3 | 4 | 5 | 6 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.