Most enterprise IT professionals agree, securing the network only at the perimeter is inadequate for today's data centers. Modern attacks can exploit a perimeter-centric defense. In this paper, we show how VMware NSX enables security that is both ubiquitous and granular by integrating security functions into the...
A very advanced and targeted cyber-espionage campaign has been active for five years, and employs stealthy malware that can penetrate air-gapped networks and exfiltrate data using multiple techniques, security researchers warn.
Adoption of cloud applications and infrastructure is increasing. As a result, IT teams are expected to be experts in evaluating their features and capabilities. Deep knowledge of redundancy, global infrastructure, and SLAs has also become business critical. However, there is one section in the cloud service provider's...
In the wake of the Hillary Clinton email controversy, organizations need to be more aware of the risks of unsanctioned "shadow IT" and take appropriate mitigation steps, says security expert Mac McMillan.
More than 200,000 internet-connected systems remain vulnerable to the OpenSSL vulnerability known as Heartbleed, more than two years after the flaw was publicly announced and related patches released, warns security researcher Billy Rios.
While malware may be used for an initial attack, hackers quickly begin using tools to move around networks that often don't raise suspicion. Here's what to look out for to detect a "low and slow" attack.
After channeling horror films and holding control of smart TVs for ransom, the ransomware innovation du jour involves attackers crypto-locking files using JavaScript. But security experts say IT administrators can deploy some relatively easy defense measures.
A massive scan of open internet ports confirms long-held assumptions that old, insecure internet protocols never die, and in fact may still thrive, especially in Belgium, says Rapid 7 security research manager Tod Beardsley.
The maturity of the network access control (NAC) market presents organizations with a strong selection of vendors that offer evolved capabilities. Enterprises are prioritizing low-level complexity of administration, flexibility of controls, ease of integration, and competitive product pricing as the main selection...
For its next move since jettisoning storage firm Veritas and becoming a pure-play security vendor, Symantec plans to buy network and cloud security firm Blue Coat from private-equity owners Bain Capital for $4.65 billion, gaining a new CEO in the process.
A federal watchdog agency will investigate whether government monitoring of medical device security controls is adequate, it announced in an update of its priorities for the rest of this year. In a separate report, it raised serious concerns about the security of the Washington state Obamacare insurance exchange.
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Security teams face increasing pressure from management to prevent breaches, discover attacks faster, and
become more efficient. Most will not succeed because the security infrastructures they have in place do not work
against most of the advanced persistent threats organizations face today.
Download this white...
Novetta Cyber Analytics is an advanced network-traffic analytics solution that empowers analysts with comprehensive, near real-time
cyber security visibility and awareness, filling a critical gap in today's enterprise cyber security toolset. With queries that take only
seconds - even at Petabyte network traffic...
Vietnam's TPBank says it successfully foiled more than $1 million in fraudulent transfer requests apparently initiated by the same hackers who targeted Bangladesh Bank and other SWIFT-using institutions with PDF reader malware.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.