Network Security 

Cisco Gets into CASB Tech with $293M Purchase of CloudLock

Cisco broadens its cloud security business with $293 million acquisition of CloudLock, a provider of cloud access security broker (CASB) technology.

Ransomware Is on a Roll – So How Can You Stop It

Ransomware is a favored tool for hackers. Three tips can help you proactively remove ransomware attack vectors.

Carbonite, GoToMyPC Hit by Password Reuse Attacks

Both attacks leveraged email addresses and password stolen from other sites.

What Is SQL Injection and How Can It Hurt You?

Using SQL injection hackers can wreak havoc on databases and data-driven applications. Fortunately there are ways to reduce SQL injection risk.

Wendy's Hit By Class Action Lawsuit Over Massive Credit Card Breach

The suit was filed by Veridian Credit Union on behalf of all U.S. financial institutions whose customers were affected by the data breach.

Startup Spotlight: Demisto's Security Chat-ops Platform

Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.

Acer Hacked

Names, addresses, credit card numbers, expiration dates and CVV codes were accessed.

Cisco Intros $10 Million Global Cyber Security Scholarship Program

The program is intended to increase the pool of available talent with cyber security skills.

Making a Case for Security Analytics

Security analytics can help companies get more proactive about their security efforts.

27 Percent of Cloud Apps Present Significant Risks to the Enterprise

And the average organization's users connect 733 third-party cloud apps to the corporate environment, according to a recent report.

5 Ways to Defuse Data Threat from Departing Employees

Departing employees who take sensitive data with them present a huge security threat. Protection begins with data discovery and classification.

66 Percent of U.S. Adults Say They're Likely to Stop Doing Business with a Breached Company

And 21 percent are very likely to do so, a recent survey found.

Industry with Worst Web App Security May Surprise You

IT fares the worst of 12 industries in several key application security metrics, finds a WhiteHat Security report. How can IT – and other industries – improve?

Majority of NFL Players' Medical Exam Results Exposed by Laptop Theft

The unencrypted laptop held copies of the medical exam results for all NFL Combine attendees for the past 13 years.

How Bad Is Burr-Feinstein Anti-Encryption Legislation?

Proposed anti-encryption legislation known as "Burr-Feinstein," filed in the wake of Apple's legal showdown with the FBI, had broad business ramifications.

6 Questions to Ask Yourself about Your Cloud Security

While companies are more at ease with the cloud, they still have concerns about cloud security. Asking these questions will help improve cloud security postures.

Myspace, Tumblr, Fling Breaches Exposed 465 Million Accounts

The data, all of it dating back to 2013 or earlier, is being offered for sale online.

40 Percent of IT Pros Say C-Suite Poses Greatest Risk to Information Security

The same percentage admitted having retained access to sensitive data after leaving a job, a recent survey found.

LightCyber Shines a Light on Real Threats [VIDEO]

Gonen Fink, CEO of LightCyber, explains how his firm's technology helps solve  a key missing piece of the security alert mystery.

Unencrypted Laptops Expose Over 400,000 Patients' Medical Data

Far too many unencrypted laptops containing vast amounts of sensitive data are still being left in employees' vehicles.

Phishing Attacks Steal W-2 Info from Milwaukee Bucks, Saint Agnes Medical Center, Rockhurst University

Thousands of employees' tax information may have been stolen.

Healthcare Data Breaches Expose 65,000 People's PHI

The potentially exposed data includes names, addresses, Social Security numbers, birthdates, treatment information and health insurance information.

LinkedIn Breach Exposed 117 Million User Accounts

The stolen database holds 167 million records, of which 117 million include email addresses and passwords.

Where Should Security Keys be Kept in the Cloud?

VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.

Ransomware and the Internet of Things: A Growing Threat

IoT's integration into the world of business, along with the evolution of ransomware, creates the perfect storm for a cybersecurity arms race.