After 15 years, the OWASP Top 10 list remains largely the same
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.
To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
No amount of planning can replace regular drills. Here’s what they should include.
Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.
Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.
Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.
As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Ireland, already a European data center hub, expects GDPR and Brexit to drive more data center growth.
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud
An expert says accessing the Dell EMC appliance allows attackers to get at the information stored in critical databases and servers without having to break into those servers directly. Dell EMC and VMware have issued patches, which should be applied immediately.
AI tools can handle more data than human security pros ever can and find anomalies that are invisible to humans.