SECURITY NEWS

Stay up to date with the latest news in the IT security world.

LATEST SECURITY NEWS ARTICLES

Twitter Patches High Impact Account Tweeting Flaw

|

The vulnerability could have potentially enabled an attacker to tweet from any user account, without the need to first compromise or exploit the user.

READ MORE

Three Quarters of CEOs Are Putting Corporate Data at Risk

|

Still, 63 percent say losing corporate data would destroy their business, a recent survey found.

READ MORE

Why Akamai Supports Let's Encrypt

|

VIDEO: Andy Ellis Chief Security Officer at Akamai explains why the free Let's Encrypt SSL/TLS certificate initiative is important.

READ MORE

New Threats Emerge Using Same Exploit As WannaCry Ransomware

|

Cybercriminals are leveraging the EternalBlue vulnerabilities to launch a range of other attacks.

READ MORE

Data Breach at Restaurant Search Service Exposes 17 Million User Accounts

|

User IDs, names, user names, email addresses and hashed passwords were stolen.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Live Event Date: June 29, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT Security teams looking to extend their network perimeter defenses with an attack and breach detection capability are discovering that a hosted SIEM gets them up and running faster. IBM QRadar on Cloud is a …

How to Meet the Unique Challenges of Protecting Cloud Assets

On-demand Event Event Date: March 23, 2017 As you adopt the use of cloud services, whether in public/IaaS, SaaS or hybrid environments, the attack surface expands and, if breached, the costs increase exponentially. This session is designed to help IT and security leaders understand and …

How to Fight Ransomware with UnityŽ Active Archive

Of all the cybercriminal threats out there, being attacked by ransomware is among the most devastating. And here's the real issue: Anti-malware products are not infallible, and when they fail, conventional computer architectures readily allow data corruption by malware that masquerades as …

Top Three Gaping Holes in Your Data Security

Your IT team understands the importance of securing the network against data breaches from external threats. Regardless of your efforts, data breaches usually begin from inside your network, often due to lax or unenforced security policies. *Did you know? Insider threats are now the most …
 
SEE ALL WHITEPAPERS
 
Sensory's TrulySecure Biometric Security Gets an AI Upgrade

Sensory's TrulySecure Biometric Security Gets an AI Upgrade

|

The company's latest update to its TrulySecure biometrics technology includes advanced deep learning algorithms that are tougher to trick.

READ MORE
WannaCry Ransomware Hits U.S. Critical Infrastructure

WannaCry Ransomware Hits U.S. Critical Infrastructure

|

The victims include small utilities and manufacturing sites, according to Dragos CEO Robert M. Lee.

READ MORE
Karamba Raises $12M for Vehicle Security

Karamba Raises $12M for Vehicle Security

|

Connected and autonomous vehicles represent a growing threat vector that needs to be defended.

READ MORE
DocuSign, Bell Canada Hacked

DocuSign, Bell Canada Hacked

|

The hackers stole customer email addresses for use in phishing campaigns and other attacks.

READ MORE