Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.
As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Ireland, already a European data center hub, expects GDPR and Brexit to drive more data center growth.
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud
An expert says accessing the Dell EMC appliance allows attackers to get at the information stored in critical databases and servers without having to break into those servers directly. Dell EMC and VMware have issued patches, which should be applied immediately.
AI tools can handle more data than human security pros ever can and find anomalies that are invisible to humans.
A new kind of malware goes after industrial safety systems that provide emergency shutdown capabilities. It can cause damage or […]
Short on security professionals, enterprises scream for more automation as attacks increase in number and scope.
Here’s what data center managers can do to reduce exposure to the likes of the Andromeda botnet.
By being slow to add deep visibility into cloud environments, incumbent SIEM vendors leave themselves open to disruption by the likes of Splunk.
The firewall as we know it cannot keep up with today’s enterprise application needs.
While a lot of work, honey pots are one of the most effective ways of pre-empting serious security breaches.
Secure Channels pitches a secure storage service for movies and other sensitive intellectual property, but can it solve its reputation problem?