SECURITY NEWS

Stay up to date with the latest news in the IT security world.

LATEST SECURITY NEWS ARTICLES

Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

|

Vehicle registration data for every Swedish citizen was exposed -- including those under witness protection.

READ MORE

IBM's X-Force Red Targets IoT Threats

|

Big Blue penetration-testing team will help enterprise customers shore up their IoT and connected-car systems.

READ MORE

Qualys Expands Cloud and SSL/TLS Security Services

|

New CloudView and CertView modules announced for the Qualys Cloud Platform.

READ MORE

Hackers Find BEC Attacks More Profitable than Ransomware

|

Cisco calls business email compromise 'the most lucrative and profitable method to extract large amounts of money from a business.'

READ MORE

Massive Cybercrime Shutdown: AlphaBay, Hansa Markets Go Dark

|

AlphaBay was responsible for at least $1 billion in transactions over the past three years.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Carbonite: A Cornerstone for Ransomware Protection & Recovery

Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. …

Top Three Gaping Holes in Your Data Security

Your IT team understands the importance of securing the network against data breaches from external threats. Regardless of your efforts, data breaches usually begin from inside your network, often due to lax or unenforced security policies. *Did you know? Insider threats are now the most …

Evolve Your Network as Your Business Digitally Transforms

The total number of ransomware samples grew by 127% in 2015. Find out how hybrid connectivity solutions help you stay ahead of the pace of change by keeping your network up and data secure. Evolve your network as your business digitally transforms. Level 3 offers solutions by helping …

Mobile Application Management Platform Evaluation Checklist

Mobile application management (MAM) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed MAM provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, …
 
SEE ALL WHITEPAPERS
 
Cybersecurity Analysis Company Insight Engines Raises $15.8 Million

Cybersecurity Analysis Company Insight Engines Raises $15.8 Million

|

The makers of Cyber Security Investigator for Splunk attract millions in VC funding as it eyes other markets.

READ MORE
Fear the Internet of Things: Devil's Ivy Security Flaw Impacts Millions of IoT Devices

Fear the Internet of Things: Devil's Ivy Security Flaw Impacts Millions of IoT Devices

|

The vulnerability can be exploited to view a device's video feed or to deny the owner access to the feed.

READ MORE
A Rough Few Weeks for Cloud Security: Dow Jones Exposes Millions of Users' Data

A Rough Few Weeks for Cloud Security: Dow Jones Exposes Millions of Users' Data

|

Names, addresses, account information, email addresses, and the last four digits of credit card numbers were accessible online.

READ MORE
Corelight Raises $9.2 Million for Bro-Based Security

Corelight Raises $9.2 Million for Bro-Based Security

|

The startup's Corelight Sensor product uses the open-source Bro security monitoring and network analysis platform to help businesses quickly resolve incidents.

READ MORE