Ann All - Article Archives - Page 1

Startup Spotlight: Cymmetria's Cyber Deception Technology

September 23, 2016
Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.
READ MORE

Tech Vendors, Law Enforcement Team to Take on Ransomware

August 25, 2016
Intel Security and Kaspersky Labs worked with international law enforcement agencies on a website that offers decryption keys for several variants of ransomware.
READ MORE

New IoT Threat Exploits Lack of Encryption in Wireless Keyboards

July 26, 2016
The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.
READ MORE

Startup Spotlight: Twistlock's Container Security

July 21, 2016
Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.
READ MORE

Room for Application Security Improvement

July 11, 2016
Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.
READ MORE

Cisco Gets into CASB Tech with $293M Purchase of CloudLock

June 28, 2016
Cisco broadens its cloud security business with $293 million acquisition of CloudLock, a provider of cloud access security broker (CASB) technology.
READ MORE

Startup Spotlight: Demisto's Security Chat-ops Platform

June 21, 2016
Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.
READ MORE

Industry with Worst Web App Security May Surprise You

June 8, 2016
IT fares the worst of 12 industries in several key application security metrics, finds a WhiteHat Security report. How can IT – and other industries – improve?
READ MORE

Better Security through Benchmarks

May 24, 2016
Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.
READ MORE

Lack of Monitoring Weakens Database Security

April 21, 2016
Nearly 40 percent of companies cannot monitor databases in real time, a survey finds. This poses a threat to database security, says the survey's sponsor.
READ MORE

Malvertising Gets Nastier with Fingerprint Technique

March 18, 2016
Malvertising attacks get more targeted, tougher to detect with fingerprinting.
READ MORE

ServiceNow Merges Security with Service Management

February 25, 2016
Security teams will benefit from its service management platform's workflow, automation, orchestration and systems management capabilities, says ServiceNow.
READ MORE

Attackers Favor Old Exploits, Mobile Apps

February 17, 2016
HPE's latest Cyber Risk Report finds a shift toward attackers targeting applications, especially mobile ones.
READ MORE

Webcam Hack Shows IoT Security Threat

January 12, 2016
Researchers hacked a $30 webcam to establish a persistent point of access into a network, giving security pros another concern about the IoT.
READ MORE

6 Mobile Security Predictions for 2016

January 6, 2016
Big changes for mobile security are ahead in 2016, predict mobile security experts.
READ MORE

10 Cloud Security Predictions for 2016

December 31, 2015
Cloud security is top of mind for IT professionals in 2016, as organizations migrate more applications to the cloud.
READ MORE

BSIMM's Data-driven Approach to Software Security

November 24, 2015
The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.
READ MORE

All about Authentication, Apps for Nymi

November 17, 2015
Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.
READ MORE

Trend Micro Broadens Security Offering with HP TippingPoint Buy

October 21, 2015
Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|