technology

How AI can help you stay ahead of cybersecurity threats

Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes have gone up. With this year’s fast-spreading ransomware attacks and ever-tightening compliance requirements, response must be much faster. Adding staff is tough with the cybersecurity hiring crunch, so companies are turning to machine learning and […]

How AI can help you stay ahead of cybersecurity threats Read More »

Unlimited DDoS protection the new norm after Cloudflare announcement

Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers extra when they were under attack. The company claims to have nearly 10 million customers and a presence in 117 cities around the world, with enough capacity to handle more than 15 terabits of traffic

Unlimited DDoS protection the new norm after Cloudflare announcement Read More »

The best enterprise antivirus: Kaspersky leads in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, anti-virus tools still play an important role in the enterprise security strategy. Traditional signature-based anti-virus is notoriously bad at stopping newer threats such as zero-day malware and ransomware, but it still has a place in the enterprise, experts say,

The best enterprise antivirus: Kaspersky leads in latest tests Read More »

What is a fileless attack? How hackers invade systems without installing software

“We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point.” The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These

What is a fileless attack? How hackers invade systems without installing software Read More »

China’s Quantum Net Advance Offers a Glimpse into the Future of Enterprise Security

Chinese companies actively productizing quantum key distribution, which pushes communications security to a new level Earlier this month, China’s official news agency Xinhua announced the launch of a secure quantum communications network between Shanghai and Beijing. The 2,000 kilometer (1,243 mile) backbone will be used for military and government communications, but also in commercial areas

China’s Quantum Net Advance Offers a Glimpse into the Future of Enterprise Security Read More »

Is universal end-to-end encrypted email possible (or even desirable)?

People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full end-to-end encryption would  mean that only the receiver of the email can decrypt their messages, but sharing public keys and agreeing on a common encryption standard can be tricky for

Is universal end-to-end encrypted email possible (or even desirable)? Read More »

VMware Builds Data Center Security into the Virtual Infrastructure

Anti-malware defenses are struggling to keep up with constant floods of new, fast-evolving attacks but one thing that could help is if the infrastructure itself had security built in. That’s the idea with VMware’s new AppDefense product, which lets companies restrict the types of operations allowed to applications running on virtualized servers. This kind of

VMware Builds Data Center Security into the Virtual Infrastructure Read More »