Network Security 

Radware Floats Cloud DDoS Protection Service

Like today's craftier attackers, Radware's new offering takes a targeted approach to blocking DDoS attacks on AWS and Azure applications.

1.4 Billion Data Records Exposed in 2016

That's an increase of 86 percent over the previous year, according to Gemalto.

Application Firewalls: Protecting Web Applications from Attacks

Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

Cybercriminals See 95 Percent Profit from DDoS Attacks

DDoS-as-a-service providers can launch attacks for as little as $7 an hour, according to a recent report.

Cybersecurity Pros Brace for Non-Malware Attacks

Today's IT security experts are wary about much more than dangerous viruses and other malware, finds a new survey from Carbon Black.

Bay Dynamics Adds Value to Risk Fabric

Bay Dynamics' latest security release looks at potential losses from security risks to help IT departments set priorities.

Massive Data Breach Exposes 4.8 Million Job Seekers' Personal Info

Names, Social Security numbers and birthdates were accessed.

Patch Management: How to Update Software on Your Network Securely

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

Network Access Control: Restricting and Monitoring Access to Your Network and Data

Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.

Incident Response: How to Prepare for Attacks and Breaches

Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.

Security Flaws Found in LastPass Extensions for Chrome, Firefox

The vulnerabilities, uncovered by security researcher Tavis Ormandy, were patched quickly.

GoDaddy Acquires WordPress Security Vendor Sucuri

Hosting provider aims to deliver even more security services to its clients as it expands services portfolio.

Saks Fifth Avenue, Three U.K. Mistakenly Expose Customer Data

In both cases, the information appears to have been exposed by mistake, not by an external or internal attack.

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

63 Percent of Enteprises Use Advanced Tech Without Securing Sensitive Data

59 percent of senior security executives are concerned about security breaches due to attacks hitting cloud service providers, a recent survey found.

Bayshore Networks Raises $11M for Industrial Cyber Security

Bayshore's core product platform is the company's IT/OT Gateway for industrial cyber security.

Understanding Ransomware Vectors Key to Preventing Attack

Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.

Women Comprise Just 11 Percent of Global Cyber Security Workforce

And men are nine times more likely than women to hold managerial positions, a recent survey found.

Security Pros Brace for Industrial IoT Cyber Attacks

The vast majority of IT security professionals are expecting in an increase in attacks targeting Industrial Internet of Things deployments, finds a Tripwire survey.

IaaS Security: Threats and Protection Methodologies

Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.

Russian FSB Officers Charged with Involvement in Yahoo Breach

'The indictment unequivocally shows the attacks on Yahoo were state-sponsored,' Yahoo's assistant general counsel said.

Endpoint Security: Preventing Threats on Devices Connected to Your Network

Endpoint security provides a layer of protection for devices outside the firewall.

Misconfigured Backup Drive Exposes Sensitive U.S. Air Force Data

The exposed data included information on open investigations, as well as completed applications for national security clearances.

TopSpin Makes Intelligent Deception a Hacker's Worst Nightmare

Setting a trap using deceptive techniques may just snare many a hacker.

Barracuda and Zscaler Team for Cloud-Delivered User Security

The companies float a new cloud-based security service aimed at helping SMBs keep their users and data safe wherever they roam.