First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen […]
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Network engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, […]
Experts warn of blockchain security risks in non-cryptocurrency use cases.
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take to improve open source security.
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.
From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how to defend against them.
Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.
For companies that run entirely in the cloud, the entire business can be at risk. That has some looking for help with monitoring and verifying cloud security configuration.