Spectre, Meltdown Hit On-Prem Windows Servers Hardest
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud
Spectre, Meltdown Hit On-Prem Windows Servers Hardest Read More »
Performance tax of patches in many cases unavoidable; chip vulnerabilities may accelerate shift to cloud
Spectre, Meltdown Hit On-Prem Windows Servers Hardest Read More »
I is fast becoming a go-to technology for business transformation, shaking up roles across the enterprise. Here’s how to make the most of this inevitable evolution.
How AI will impact your IT career Read More »
Short on security professionals, enterprises scream for more automation as attacks increase in number and scope.
VMware-Carbon Black Partnership Expected to Close Data Center Security Gaps Read More »
Despite cultural barriers and legacy tech, AI is poised to take over ERP functions, with ERP vendors adding new machine learning features and enterprises keen to investigate.
The future of ERP is AI Read More »
Here’s what data center managers can do to reduce exposure to the likes of the Andromeda botnet.
Despite Takedowns, Botnets Aren’t Going Away Any Time Soon Read More »
Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
What is a botnet? And why they aren’t going away anytime soon Read More »
By being slow to add deep visibility into cloud environments, incumbent SIEM vendors leave themselves open to disruption by the likes of Splunk.
Why Traditional Security Info and Event Management Tools No Longer Cut It Read More »
The firewall as we know it cannot keep up with today’s enterprise application needs.
How the Cloud Killed the Firewall Read More »
While a lot of work, honey pots are one of the most effective ways of pre-empting serious security breaches.
Data Center Security: Honey Pots and the Art of Deceiving Hackers Read More »
Secure Channels pitches a secure storage service for movies and other sensitive intellectual property, but can it solve its reputation problem?
What IP? Ex-con’s Security Firm Offers to Solve Hollywood’s Piracy Problem Read More »
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
How hackers crack passwords and why you can’t stop them Read More »
Encrypting data at rest and in flight is not enough; solution could help Equifax avoid epic breach
New Chip Design Gains Traction as Fix for Major Data Center Security Hole Read More »
As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent intrusions. Attackers are evolving their methods, which might require that you look at the cyber kill chain differently. What follows is a recap of what the cyber kill chain approach
What is the cyber kill chain? Why it’s not always the right approach to cyber attacks Read More »
Machine learning helps security systems uncover deviations human security pros cannot detect
AI Starts Making Inroads into Data Center Security Read More »
As organizations move operations to cloud environments, basic security controls are sometimes not implemented correctly.
The Huge Security Threat of Misconfigured Cloud and How to Fix It Read More »