Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
While big data is a challenge to defend, big data concepts are now applied extensively across the cybersecurity industry.
After 15 years, the OWASP Top 10 list remains largely the same
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.
To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
No amount of planning can replace regular drills. Here’s what they should include.
Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.
Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.
Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.
As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Ireland, already a European data center hub, expects GDPR and Brexit to drive more data center growth.
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud