As Microsoft prepares to end support for the widely installed OS, here are the key security considerations.
The firewall is dead, and zero trust is here to replace it. But Google’s BeyondProd is only one way to skin the zero-trust cat.
The attack was limited to its managed services business in a single New York data center, the company said.
Seeing its firewall sales softening, the security vendor makes another acquisition to reorient itself for the cloud era.
Based on the secure chip in Pixel phones, the recently open sourced project holds promise for data center hardware.
APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.
Legacy applications can leave massive security holes and must be dealt with, no matter how critical they are.
For businesses that operate in the European Union, complying with GDPR has to be a top priority. In many of these organizations, the burden is falling on the data management staff.
While experts aren’t surprised, they recommend adding the latest tools to your security strategy now.
White hat hackers can be extremely useful, as long as you stay within certain guardrails.
APIs make for a more feature-rich and dynamics world of applications, but they also increase attack surface.
Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making the same mistake.
Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.
Taking a closer look at Larry Ellison’s claim of a superior, “fundamentally different” cloud architecture.
Cybercriminals follow the money, and you need look no further than Toyota Boshoku’s recent $37 million loss to see why many are turning to BEC scams.