The company extends its security capabilities beyond services running in its own cloud.
Cryptojacking may be the hot new trend in large-scale cybercrime, but ransomware is still alive and well.
Distributed, ubiquitous computing infrastructure can come at the price of a much bigger attack surface.
Explaining the NIST Cybersecurity Framework, the most popular of its kind.
Backstory, a nascent Google cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.
“This is really a broader industry concern about the firmware layer being effectively ignored by almost everybody.”
The most critical infrastructure in the data center also happens to be the most overlooked one by cybersecurity teams.
New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.
Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.
Network security is an around-the-clock battle. Agency cybersecurity teams are left with skeleton staff, and many furloughed security experts may not come back.
“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.
Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.
Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.
The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption.
Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.