The attack was limited to its managed services business in a single New York data center, the company said.
Seeing its firewall sales softening, the security vendor makes another acquisition to reorient itself for the cloud era.
Based on the secure chip in Pixel phones, the recently open sourced project holds promise for data center hardware.
Legacy applications can leave massive security holes and must be dealt with, no matter how critical they are.
While experts aren’t surprised, they recommend adding the latest tools to your security strategy now.
White hat hackers can be extremely useful, as long as you stay within certain guardrails.
But experts say this line of thinking doesn’t help, and companies should hold themselves responsible for securing their networks.
APIs make for a more feature-rich and dynamics world of applications, but they also increase attack surface.
Taking a closer look at Larry Ellison’s claim of a superior, “fundamentally different” cloud architecture.
Is it really possible to eliminate data breaches by eliminating human operators, and would Oracle be the one to do it?
Machine learning goes hand-in-hand with the new essential network security strategy.
Intelligent tools are the only way to stay abreast of the current rate of change in the network.
The vulnerability gives attackers a way in through the internet, but that’s not the whole extent of the risk.
Manual penetration testing is quickly becoming obsolete, with AI-powered tools offering a way to cover the bases.
New regulations like GDPR and CCPA can have a positive effect on security, but they can also get in the way of developing smart security tools.