Security Pros Want Automated Security, but Hesitate to Deploy It
Two-thirds of security pros polled say automating security analysis is very important to help defend networks, but only about a third of firms have adopted the technology. While nearly two-thirds of...
View ArticleNew Malware Emphasizes Need to Train Employees to Be Cynical
NEWS ANALYSIS: Cyber-criminals have found a way around perimeter security using JavaScript sent in text files and depending on social engineering. However, there are ways to reduce the impact of such...
View ArticleTop tips for Brits looking to protect themselves from online data breaches
TalkTalk’s data breach is the latest high-impact attack by cybercriminals90% of Brits worry about the security of personal information online One in five have been a victim of identity theftAlmost half...
View ArticleNo Surprise: Most Enterprises Still Lack Adequate Security
In 2015, 148 million records have been breached in 129 reported incidents—incidents that sometimes go undetected for months at a time. As far along as we are in 2015 technology and despite all the...
View ArticleIntel Security Controller Aims to Better Secure OpenStack Clouds
At the OpenStack Summit, Intel discusses its approach to cloud security in an effort that makes use of software-defined networking technology to segment and inspect traffic. TOKYO—In a virtualized data...
View ArticleRansomware Operation Racked Up $325M in Damages, Security Firms Say
A group of security firms known as the Cyber Threat Alliance analyzed CryptoWall, finding that it has caused at least $325 million in damages to hundreds of thousands of victims. The latest version of...
View ArticleSecond suspect arrested over TalkTalk cyber attack
Gang behind DroidJack Android Trojan also arrested in pan-European operation
View ArticleWhen Protecting the Cloud, Start by Building Walls
NEWS ANALYSIS: Some argue that you can't build a wall around data to protect it, but lessons learned from the past can illuminate a secure path to the future. TOKYO—Time and again, organizations cite...
View ArticleDemand for Cyber-Insurance Rises, but Insurers Worry
NEWS ANALYSIS: Massive breaches have made cyber-insurance premiums more costly, but data-analysis firms are trying to help insurers figure out who's a good bet and who is not. Over three weeks in 2013,...
View ArticleSymantec Debuts Advanced Threat Protection Service
Symantec's new ATP technology is designed to uncover advanced threats across endpoints, networks and email. Symantec is expanding its security portfolio with the launch of Symantec Advanced Threat...
View Article‘Deep Learning’ Technology Sees Through Security Software Blind Spot
NEWS ANALYSIS: There are many things that your current security software simply can't see and stopping emerging threats requires a new approach. A week ago I got a surprise in my email. Someone sent...
View ArticleNew Flexera Software App Portal Release Adds Support for Cloud & Apple® Mac...
New release extends IT governance and Service Management efficiency to cloud and Apple Mac apps while enabling ‘Consumerisation of IT’ and employee self-service programmesMaidenhead, U.K. – November 3,...
View ArticleMatrix42 survey highlights lack of clarity over enterprise mobility strategy...
Research into mobility trends reveals gap between intentions and actionsLondon, England, 3rd November 2015 – Matrix42 (http://www.matrix42.com), a top provider of software for workspace management,...
View ArticleSecurity Researchers Win $1 Million Prize for iOS 9 Exploit
Zerodium offers a $1 million bug bounty for anyone who can achieve a browser-based, untethered jailbreak of iOS 9, and one group is set to walk away with the big prize. Back in September, zero-day...
View ArticleMozilla Releases Firefox 42 With Tracking Protection Feature
With the Firefox 42 debut, Mozilla introduces a new tracking protection feature and provides patches for 17 security advisories. Mozilla's today released the Firefox 42 browser, which provides users...
View ArticleCisco Adds Threat Awareness, Cloud Access Security Broker Offerings
Cisco's Security Everywhere strategy now extends deeper into the cloud, on-premises and everywhere in between. For Cisco, the correct answer to the question of where to place security in an enterprise...
View ArticleSolfyre launches SID at Web Summit to solve the password problem simply and...
British privacy startup ensures users are fully in control of their own identities and prevents contagion from externally compromised websitesWeb Summit, Dublin – 4th November 2015 - British...
View ArticleManageEngine Debuts Real-Time Auditing in SQLDBManager Plus
DBAs Receive Instant Alerts for Server and Database-Level Security ChangesEnables DBAs to respond faster to critical changes that occur on Microsoft SQL Servers, with real-time notificationsTraces the...
View ArticleGoogle Android Update Includes Fix for New Stagefright Flaw
The fourth update for Android—since Google started monthly updates after the Stagefright flaw was discovered—is out and fixes seven vulnerabilities. As promised, Google is continuing to issue monthly...
View ArticleAlmost Half of Firms Admit IT System Breach in Ponemon Survey
A Ponemon Institute survey found 47 percent of companies encountered a system breach in the past 24 months. Nearly half of companies that responded to a Ponemon Institute survey have suffered a breach...
View Article