SECURITY ARCHIVES - Page 3

AttackIQ Enhances Cybersecurity Attack Simulation Platform

30 Oct, 2017

AttackIQ FireDrill provides a mechanism through which organizations can validate how good their security processes are today.

Delaying Windows 10 Rollouts Is Playing Russian Roulette with Your Employees

27 Oct, 2017

Microsoft is aggressively pushing out Windows 10 patches, because the speed at which the attackers are adjusting their attack vectors is unprecedented.

Lenovo, Intel and the FIDO Alliance Finally Move to Kill Off the Password

26 Oct, 2017

Thanks to Lenovo, Intel and FIDO, passwords finally may be on their way to becoming well and truly dead.

Critical Infrastructure Under Attack from APTs

26 Oct, 2017

Spearphishing emails are specifically designed to target industrial control systems personnel with malicious Microsoft Word attachments masked as legitimate files, including resumes and policy documents.

New Tech Proves Helpful in Emergencies

26 Oct, 2017

The wildfires in California provide real evidence that new tools are helpful in efforts to save lives and limit property damage.

Symantec Bolsters Endpoint Security

25 Oct, 2017

Symantec can deliver a more robust set of cybersecurity defenses to the endpoint without increasing the total amount of processing horsepower needed to be devoted to security software.

Understanding Cybersecurity Past to Address Cybersecurity Future

23 Oct, 2017

Cybercriminals aren’t reinventing new malware or attack vectors; they are modernizing them to circumvent more sophisticated security systems and more security-aware users.

Wi-Fi Vulnerability Dire Because It Is in the WPA2 Security Standard

23 Oct, 2017

A serious weakness has been discovered that endangers Wi-Fi users. The problem is made worse by the fact that the problem is in the WPA2 standard, not a specific device or network.

Defending Your Internet Infrastructure

19 Oct, 2017

Internet volatility is unpredictable, and your customers are relying on you to be available. So what are you doing to be prepared for a potential attack?

Trends in Ransomware According to the ‘Virus Doctor’

18 Oct, 2017

Ken Dwight, the 'Virus Doctor,' explains the scary trends around ransomware, including more targeted attacks and malvertising traps.

Perhaps Autonomous Vehicles’ Estimated Time of Arrival Should Be Pushed Back

16 Oct, 2017

Many questions remain, on many different topics and levels of difficulty, about autonomous vehicles. Perhaps it would be wise to take our foot off the gas pedal until these questions are answered.

Wi-Fi Bug Adds Risks to IoT and Smartphones

16 Oct, 2017

Security for the Internet of Things (IoT) has suffered a major blow. So has the security for any device that uses Wi-Fi connections.

The State of IT in 2018 Will Feature Security Budget Increases

12 Oct, 2017

It is time to start thinking about 2018. Any day now, the security predictions for next year will be arriving.

LogRhythm Unfurls AI Cloud Service to Enhance Security

12 Oct, 2017

LogRhythm plans to make available a series of add-on modules infused with artificial intelligence (AI) capabilities to make it simpler to detect advanced security threats and ongoing attacks.

ShiftLeft Launches Threat Detection Cloud Service for Developers

11 Oct, 2017

ShiftLeft is providing a security-as-a-service (SECaaS) capability via security software running on Amazon Web Services (AWS) that automates the threat detection process.

Password Policies in Place, but They Are Not Enforced

09 Oct, 2017

Passwords are not new security issues, and you would think that we would be further along in our awareness.

As Latest Breach Updates Show, Security Incidents Often Worse Than Initially Reported

05 Oct, 2017

In cybersecurity, expect it to be worse than it is. The corollary is, by the time you find out about the breach, the damage is done.

ThinAir Applies Conversational Interface to IT Security Investigations

03 Oct, 2017

End users are starting to regularly employ conversation interfaces to query applications. Now ThinAir is bringing support for a similar conversation interface capability to IT security software.

Phishing Emails Responsible for Almost All Successful Cyberattacks

02 Oct, 2017

Awareness is key, as Cybersecurity Awareness Month is all about, but maybe we need to bring a lot more awareness to the problems behind phishing.

SAP Sets Blockchain Course

02 Oct, 2017

The biggest issue is not so much the blockchain technology as much as the business models that will be flushed out around it.

« Prev |  1 | 2 | 3|4 | 5 | 6 | 7 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.