Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.
New tools put more power in the hands of security professionals, whose responsibilities have grown exponentially.
Pinpointing the right level of security spend is easy in theory but not in practice.
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
They may not have the scale or the reputation of big vendors, but security startups are often better positioned to meet your specific needs.
The law goes into effect in 2020, but now is a good time to start preparing.
Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.
The volume of data traveling on networks and sophistication of attack tools are outpacing human experts’ capabilities.
The rise of machine learning is driving adoption of liquid cooling, but the switch from air to liquid isn’t simple.
As enterprises get increasingly interconnected, cyber insurance for data centers is becoming not only a priority, it’s becoming a best practice.
Interxion has launched an encryption key management service called Key Guardian.
While big data is a challenge to defend, big data concepts are now applied extensively across the cybersecurity industry.
After 15 years, the OWASP Top 10 list remains largely the same
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.