The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and […]
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen […]
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Network engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, […]
Experts warn of blockchain security risks in non-cryptocurrency use cases.
As enterprises get increasingly interconnected, cyber insurance for data centers is becoming not only a priority, it’s becoming a best practice.
Interxion has launched an encryption key management service called Key Guardian.
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
While big data is a challenge to defend, big data concepts are now applied extensively across the cybersecurity industry.
After 15 years, the OWASP Top 10 list remains largely the same
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.