Backstory, a nascent Google cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.
“This is really a broader industry concern about the firmware layer being effectively ignored by almost everybody.”
The most critical infrastructure in the data center also happens to be the most overlooked one by cybersecurity teams.
New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.
Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.
Network security is an around-the-clock battle. Agency cybersecurity teams are left with skeleton staff, and many furloughed security experts may not come back.
“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.
Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.
Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.
The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption.
Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.
New tools put more power in the hands of security professionals, whose responsibilities have grown exponentially.
Pinpointing the right level of security spend is easy in theory but not in practice.
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.