Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.
To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors. With artificial intelligence (AI) and machine learning, this data can also be used to make predictions. Is an employee planning to steal data? To defraud the company? To engage in insider trading? To sexually harass another employee?
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen […]
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Network engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, […]
Experts warn of blockchain security risks in non-cryptocurrency use cases.
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take to improve open source security.
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.
From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how to defend against them.