cybersecurity

What is a fileless attack? How hackers invade systems without installing software

“We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point.” The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These […]

What is a fileless attack? How hackers invade systems without installing software Read More »

China’s Quantum Net Advance Offers a Glimpse into the Future of Enterprise Security

Chinese companies actively productizing quantum key distribution, which pushes communications security to a new level Earlier this month, China’s official news agency Xinhua announced the launch of a secure quantum communications network between Shanghai and Beijing. The 2,000 kilometer (1,243 mile) backbone will be used for military and government communications, but also in commercial areas

China’s Quantum Net Advance Offers a Glimpse into the Future of Enterprise Security Read More »

Is universal end-to-end encrypted email possible (or even desirable)?

People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full end-to-end encryption would  mean that only the receiver of the email can decrypt their messages, but sharing public keys and agreeing on a common encryption standard can be tricky for

Is universal end-to-end encrypted email possible (or even desirable)? Read More »

VMware Builds Data Center Security into the Virtual Infrastructure

Anti-malware defenses are struggling to keep up with constant floods of new, fast-evolving attacks but one thing that could help is if the infrastructure itself had security built in. That’s the idea with VMware’s new AppDefense product, which lets companies restrict the types of operations allowed to applications running on virtualized servers. This kind of

VMware Builds Data Center Security into the Virtual Infrastructure Read More »

What Europe’s New Data Protection Law Means for Data Center Operators

The new  European General Data Protection Regulation  goes into effect next May and applies to any company, anywhere in the world, that collects sensitive data about European customers or employees. GDPR also comes with onerous breach notification requirements and high penalties for failing to comply, and data center operators may become prime targets for regulators’

What Europe’s New Data Protection Law Means for Data Center Operators Read More »

Quantum Computing Could Make Today’s Encryption Obsolete

Researchers at top university and corporate labs around the world are in a furious race to create the first practical, usable quantum computer. Quantum computers — which use quantum bits, or qubits — are capable of running computations impossible for existing technology. It promises to open up new possibilities in areas like medical research, artificial

Quantum Computing Could Make Today’s Encryption Obsolete Read More »

Two years after the OPM data breach: What government agencies must do now

The Office of Personnel Management breach in June 2015 was a big wake up call to our federal government, and, in its wake, a number of initiatives were launched to improve the government’s cybersecurity posture. Despite several concrete improvements, progress has stalled in some areas, as demonstrated by a series of assessments conducted since the

Two years after the OPM data breach: What government agencies must do now Read More »

With new dynamic capabilities, will whitelisting finally catch on?

Everybody knows and hates whitelisting. Employees are only allowed to install approved software on their desktops and laptops, so they’re always complaining and asking for exceptions. Management eventually gets fed up with it and stops the experiment. For mobile devices, enterprises have a number of tools at their disposal, including mobile device management. In addition,

With new dynamic capabilities, will whitelisting finally catch on? Read More »