Recent studies and surveys indicate that improperly configured public cloud instances continue to turn sensitive data into low hanging fruit.
As more data center managers move to private, public, and hybrid cloud infrastructures, new security challenges emerge, but clouds also offer new technologies to help meet security challenges.
Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.
Here are the most common types of attack that bring down data centers.
The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.
In the AI-fueled security wars, most of the arsenal is currently in the hands of the good guys, but the balance of power might soon change.
Micro-segmentation company Guardicore raised $60 million this week, but it’s not alone.
Experts say exploits would be sophisticated and take a long time to build, but operators should act now.
Next-gen SIEM providers eyeing incumbents with new tech features, modern takes on pricing
Ransomware remains the dominant form of cyberattack and phishing attacks now have more impact, despite more awareness.
The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here’s how it works and what you can do to mitigate its risk.
Attackers are smarter and attacks are more powerful, but so are the tools used to fight them.
You already use your phone to pay for groceries, so why not also use it to access your server room?
India-based technology giant Wipro, which offers a “boundaryless data center” among its services, has fallen victim to a phishing attack that may […]
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.