SECURITY NEWS

Stay up to date with the latest news in the IT security world.

LATEST SECURITY NEWS ARTICLES

Capsule8 Goes Cloud-Native and Container-Aware for Threat Prevention and Response

|

Built for production clouds, Capsule8 Protect provides continual threat detection and blocks attacks on containerized environments.

READ MORE

Managing Third Party Risk: Outside Law Firm Exposes Wells Fargo Client Data

|

The data exposed ranges from high net worth clients' financial details to financial advisors' compensation information and client lists.

READ MORE

Intrusion Detection and Prevention Startup Bricata Raises $8 Million

|

The company's multi-pronged, AI-enhanced intrusion detection and prevention attracts VC funding.

READ MORE

Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

|

Vehicle registration data for every Swedish citizen was exposed -- including those under witness protection.

READ MORE

IBM's X-Force Red Targets IoT Threats

|

Big Blue penetration-testing team will help enterprise customers shore up their IoT and connected-car systems.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Deploying an EFSS Solution: Six Steps for Success

Enterprise File Synchronization and Sharing (EFSS) products are making inroads into the enterprise. In fact, Forrester analyst Ted Schadler recently called the space the "hottest technology category since social networking." However, many EFSS implementations leave a number of critical …

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …

Top Three Gaping Holes in Your Data Security

Your IT team understands the importance of securing the network against data breaches from external threats. Regardless of your efforts, data breaches usually begin from inside your network, often due to lax or unenforced security policies. *Did you know? Insider threats are now the most …

Beyond Perimeter Security: How to secure your education network from the inside out

Traditional perimeter security isn't enough in the new era of increasingly sophisticated cyberthreats, especially when it comes to protecting valuable student, faculty, and administrative data. This helpful eGuide shows how districts and universities can effectively ensure their data …
 
SEE ALL WHITEPAPERS
 
Qualys Expands Cloud and SSL/TLS Security Services

Qualys Expands Cloud and SSL/TLS Security Services

|

New CloudView and CertView modules announced for the Qualys Cloud Platform.

READ MORE
Hackers Find BEC Attacks More Profitable than Ransomware

Hackers Find BEC Attacks More Profitable than Ransomware

|

Cisco calls business email compromise 'the most lucrative and profitable method to extract large amounts of money from a business.'

READ MORE
Massive Cybercrime Shutdown: AlphaBay, Hansa Markets Go Dark

Massive Cybercrime Shutdown: AlphaBay, Hansa Markets Go Dark

|

AlphaBay was responsible for at least $1 billion in transactions over the past three years.

READ MORE
Cybersecurity Analysis Company Insight Engines Raises $15.8 Million

Cybersecurity Analysis Company Insight Engines Raises $15.8 Million

|

The makers of Cyber Security Investigator for Splunk attract millions in VC funding as it eyes other markets.

READ MORE