Adoption of cloud applications and infrastructure is increasing. As a result, IT teams are expected to be experts in evaluating their features and capabilities. Deep knowledge of redundancy, global infrastructure, and SLAs has also become business critical. However, there is one section in the cloud service provider's...
In the wake of the Hillary Clinton email controversy, organizations need to be more aware of the risks of unsanctioned "shadow IT" and take appropriate mitigation steps, says security expert Mac McMillan.
More than a quarter of third-party apps connected to corporate environments are considered "high-risk." This explains why you might be feeling pressure to secure your company's IP when there is no longer an identifiable network perimeter.
That's where Cloud Access Security Brokers (CASBs) come in. A CASB can help...
More than 200,000 internet-connected systems remain vulnerable to the OpenSSL vulnerability known as Heartbleed, more than two years after the flaw was publicly announced and related patches released, warns security researcher Billy Rios.
While malware may be used for an initial attack, hackers quickly begin using tools to move around networks that often don't raise suspicion. Here's what to look out for to detect a "low and slow" attack.
A massive scan of open internet ports confirms long-held assumptions that old, insecure internet protocols never die, and in fact may still thrive, especially in Belgium, says Rapid 7 security research manager Tod Beardsley.
The maturity of the network access control (NAC) market presents organizations with a strong selection of vendors that offer evolved capabilities. Enterprises are prioritizing low-level complexity of administration, flexibility of controls, ease of integration, and competitive product pricing as the main selection...
For its next move since jettisoning storage firm Veritas and becoming a pure-play security vendor, Symantec plans to buy network and cloud security firm Blue Coat from private-equity owners Bain Capital for $4.65 billion, gaining a new CEO in the process.
A federal watchdog agency will investigate whether government monitoring of medical device security controls is adequate, it announced in an update of its priorities for the rest of this year. In a separate report, it raised serious concerns about the security of the Washington state Obamacare insurance exchange.
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Security teams face increasing pressure from management to prevent breaches, discover attacks faster, and
become more efficient. Most will not succeed because the security infrastructures they have in place do not work
against most of the advanced persistent threats organizations face today.
Download this white...
Novetta Cyber Analytics is an advanced network-traffic analytics solution that empowers analysts with comprehensive, near real-time
cyber security visibility and awareness, filling a critical gap in today's enterprise cyber security toolset. With queries that take only
seconds - even at Petabyte network traffic...
Vietnam's TPBank says it successfully foiled more than $1 million in fraudulent transfer requests apparently initiated by the same hackers who targeted Bangladesh Bank and other SWIFT-using institutions with PDF reader malware.
The theft of $81 million from Bangladesh Bank was "part of a wider and highly adaptive campaign targeting banks," SWIFT warns its 11,000 customers. Investigators say signs point to the same attackers having hacked Sony Pictures Entertainment in 2014.