How to Secure Your AWS Storage Buckets
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
How to Secure Your AWS Storage Buckets Read More »
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
How to Secure Your AWS Storage Buckets Read More »
They may not have the scale or the reputation of big vendors, but security startups are often better positioned to meet your specific needs.
Why Entrusting Security to a Startup May Be Worth the Risk Read More »
Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.
4 top challenges to a secure digital transformation Read More »
The law goes into effect in 2020, but now is a good time to start preparing.
California’s New Privacy Act May Drive Tighter Controls in Data Centers Read More »
Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.
What are next generation firewalls? How the cloud and complexity affect them Read More »
Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.
Can Supercomputers Improve Cybersecurity? Not for a While Read More »
To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors. With artificial intelligence (AI) and machine learning, this data can also be used to make predictions. Is an employee planning to steal data? To defraud the company? To engage in insider trading? To sexually harass another employee?
Corporate pre-crime: The ethics of using AI to identify future insider threats Read More »
The volume of data traveling on networks and sophistication of attack tools are outpacing human experts’ capabilities.
Machine Learning Is Becoming a Must in Data Center Network Security Read More »
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen records were missed the first time around. Then another announcement, with another upward correction. With each new revelation, the hacked organization loses credibility and faces greater liability. To read this article in full, please click
3 reasons companies fail to assess the scope of a data breach Read More »
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
California Consumer Privacy Act: What you need to know to be compliant Read More »
Experts warn of blockchain security risks in non-cryptocurrency use cases.
5 ways to hack blockchain in the enterprise Read More »
As enterprises get increasingly interconnected, cyber insurance for data centers is becoming not only a priority, it’s becoming a best practice.
Does Your Data Center Have Adequate Cyber Insurance? Read More »
Interxion has launched an encryption key management service called Key Guardian.
Following Equinix’s Lead, Interxion Gets Into Encryption Key Management Read More »
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Hardware, software options emerge for runtime encryption Read More »
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
Cloud functions present new security challenges Read More »