Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
The firewall as we know it cannot keep up with today’s enterprise application needs.
While a lot of work, honey pots are one of the most effective ways of pre-empting serious security breaches.
Secure Channels pitches a secure storage service for movies and other sensitive intellectual property, but can it solve its reputation problem?
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
Encrypting data at rest and in flight is not enough; solution could help Equifax avoid epic breach
As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, […]
Machine learning helps security systems uncover deviations human security pros cannot detect
As organizations move operations to cloud environments, basic security controls are sometimes not implemented correctly.
Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes […]
Experts question the company’s ability to survive allegations that the Russian government has built backdoors into its software.
Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers […]
WannaCry and Petya demonstrate that worms have come into their own, and keeping systems patched only goes so far from protecting your data center against them.
It happens in every company. Employees find a cool new online service that makes them more productive. They create free […]