SECURITY ARCHIVES - Page 5

IBM Looks to Advance Blockchain Adoption via Cloud Service

22 Aug, 2017

Blockchain technologies have the potential to transform how business-to-business transactions are conducted by providing access to a shared immutable ledger. IBM is ready to put those blockchain technologies to use in a production environment hosted on the IBM Cloud.

Understanding 2017 Cybersecurity: Social Engineering for Cyberattacks the Theme of 2016

21 Aug, 2017

Optiv looked at what happened in 2016 and then used that analysis to get a better understanding of what we might see in the coming months.

Cisco Moves to Secure Collaboration Across Cisco Spark Platform

21 Aug, 2017

The latest Cisco Spark update, among other capabilities, adds the ability to encrypt all communications occurring across the platform alongside a variety of new compliance controls.

Druva Unfurls Cloud Platform to Unify Management of Data Protection

17 Aug, 2017

The rise of cloud computing creates an opportunity to rethink how data protection gets implemented and managed on an end-to-end basis.

Studies Show Ways Organizations Struggle with Cybersecurity

17 Aug, 2017

No matter how much organizations of any size think they know about practicing good security, there is still a lot of room for improvement.

BlackBerry and Vuzix Partner to Make AR More Secure

15 Aug, 2017

Increasingly, AR glasses will become a requirement, not only for increased productivity in certain jobs but also for increased safety.

FCC Shrouds Itself in Secrecy over DDoS Attacks and Response

14 Aug, 2017

The FCC is unwilling to discuss its cybersecurity efforts, which begs the question of whether this is a good or bad strategy overall.

Ukrainian Arrested in Connection with NotPetya Ransomware

11 Aug, 2017

Rare good news in ransomware came this week, with an arrest.

Hackers Say Privileged User Credentials Favorite Way to Get Your Data

10 Aug, 2017

Once you have someone’s credentials, you pretty much have the keys to the kingdom. It’s difficult to detect an intruder who has used legitimate credentials to gain access.

Second Quarter Reported DDoS Attacks Lasting Days, Not Minutes

07 Aug, 2017

What would you do if your company was hit with a DDoS attack that lasted 11 days?

HBO Hack: How Did They Let It Happen?

04 Aug, 2017

At HBO, many people are probably wondering if they’ll have jobs at the end of the month, because it is doubtful the HBO board or executive staff is in much of a forgiving mood given the coverage.

Two Very Different Cybersecurity Stories from Washington

03 Aug, 2017

All in all, this week in Washington, it appears that Congress is taking cybersecurity more seriously. Now it’s time for the White House to step up.

Ransomware Devastating to SMBs

02 Aug, 2017

SMBs are especially vulnerable to attacks because of their limited capabilities and the likelihood that old flaws, which long have been corrected by enterprise IT teams, are still unpatched and dangerous.

Majority of Companies Get Failing Grades on Cybersecurity Performance

31 Jul, 2017

How do you think your cybersecurity investments and performance would hold up if they were graded? Do you think your company is doing an above average job in this area?

Cato Networks Adds IPS Service

31 Jul, 2017

The IPS service complements the company’s existing portfolio of networking and security services that include web application firewalls as well as wide area network (WAN) optimization services.

Tactics Used by Phishing Hackers

27 Jul, 2017

Researchers went undercover by creating several fake user accounts and then deployed techniques to lure in criminals and tracked them over the span of nine months.

Digital Guardian Pushes Data Loss Prevention into the Cloud

26 Jul, 2017

Digital Guardian Analytics and Reporting Cloud makes use of an implementation of the Apache Spark in-memory computing framework and related Big Data software hosted on AWS to identify sources of data exfiltration.

Study Shows the Complexity of Malware Attacks

26 Jul, 2017

The U.S. had the most dramatic swings in malware attacks, with the worst week coming during the week of May 8. Most of the attacks were trojans.

Overcoming Enterprise Fears About Blockchain

26 Jul, 2017

It’s probably too soon to say definitively whether blockchain will help or hurt a given enterprise, but it is certainly something to keep an eye on.

Flash in the Past, But Vigilance Still a Key

26 Jul, 2017

Flash will soon be a thing of the past. That is no reason, however, to not be vigilant in protecting your computing devices today.

« Prev |  1 | 2 | 3 | 4 | 5|6 | 7 | 8 | 9 | Next » Last
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.