SECURITY NEWS

Stay up to date with the latest news in the IT security world.

LATEST SECURITY NEWS ARTICLES

NeuVector Releases CIS Compliance Tools for Kubernetes 1.6

|

The company releases new tools to help organizations ensure that their Kubernetes 1.6 container orchestration deployments meet the Center for Internet Security's benchmarks.

READ MORE

Over a Quarter of Government Computers Run on Outdated Operating Systems

|

The same is true of 15 percent of computers in finance, healthcare and retail.

READ MORE

ZingBox Extends IoT Security Lifeline to Healthcare Organizations

|

The company offers healthcare organizations free access to its IoT Guardian security solution in the wake of WannaCry.

READ MORE

Configuration Error Exposes Almost All American Voters' Personal Data

|

1.1 terabytes of data was left publicly accessible in an unprotected database.

READ MORE

Stack Clash Vulnerability Exploits Linux Stack Guard

|

Security firm Qualys discovers flaws in the Linux kernel and glibc library, that fortunately have not been exploited in the wild by attackers - yet

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Find IT Problems Before They Find You

Solve your IT issues, ninja-style. Proactively managing your company's IT environment takes skill and discipline. That means your internal IT department has to be ready to solve problems before your users notice them. In this eBook you'll be given efficient strategies for: Systems …

Contact Center Economics and the Cloud: Move to the Cloud with Confidence

If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers …

6 Reasons for Health IT to Adopt the Cloud

Healthcare organizations have many options for determining a customized cloud environment that addresses the privacy, security, and availability requirements for specific applications which will help them meet their unique business and regulatory needs. However, it's important to note that …

E-Signatures 201: Get the Details on Integration, Customization and Advanced Workflow

On-Demand Webinar Organizations of all sizes are using e-signature technology to transform the way they serve customers by offering a more convenient and efficient digital experience. If your organization is planning its digital transformation, if you're investigating e-signatures, or if …
 
SEE ALL WHITEPAPERS
 
Financial Institutions Report Surge in Fraud

Financial Institutions Report Surge in Fraud

|

To handle the threat of fraud, 24 percent of corporations plan to increase their spending on fraud prevention, detection and controls.

READ MORE
Risk Management Pros Say an IoT Security Incident Could Be Catastrophic

Risk Management Pros Say an IoT Security Incident Could Be Catastrophic

|

Still, just 44 percent say they're able to protect their systems from risky IoT devices.

READ MORE
SiteLock's SMART/DB Protects SMB WordPress Websites

SiteLock's SMART/DB Protects SMB WordPress Websites

|

The company launches a private beta of its security solution for WordPress databases.

READ MORE
11 Top Security Technologies for 2017

11 Top Security Technologies for 2017

|

Key technologies, according to Gartner, will range from cloud workload protection platforms to managed detection and response solutions.

READ MORE