You already use your phone to pay for groceries, so why not also use it to access your server room?
India-based technology giant Wipro, which offers a “boundaryless data center” among its services, has fallen victim to a phishing attack that may […]
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.
The company extends its security capabilities beyond services running in its own cloud.
Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and cyber criminals.
Cryptojacking may be the hot new trend in large-scale cybercrime, but ransomware is still alive and well.
Distributed, ubiquitous computing infrastructure can come at the price of a much bigger attack surface.
Explaining the NIST Cybersecurity Framework, the most popular of its kind.
In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just part of the answer, however.
Backstory, a nascent Google cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.
“This is really a broader industry concern about the firmware layer being effectively ignored by almost everybody.”
The most critical infrastructure in the data center also happens to be the most overlooked one by cybersecurity teams.
New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.
Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.
Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.