To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
No amount of planning can replace regular drills. Here’s what they should include.
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.
Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take to improve open source security.
Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.
As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.
From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how to defend against them.
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Acquisition’s main purpose is brainpower; Skyport appliance will sunset
Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.