SECURITY NEWS

Stay up to date with the latest news in the IT security world.

LATEST SECURITY NEWS ARTICLES

Cybersecurity Analysis Company Insight Engines Raises $15.8 Million

|

The makers of Cyber Security Investigator for Splunk attract millions in VC funding as it eyes other markets.

READ MORE

Fear the Internet of Things: Devil's Ivy Security Flaw Impacts Millions of IoT Devices

|

The vulnerability can be exploited to view a device's video feed or to deny the owner access to the feed.

READ MORE

A Rough Few Weeks for Cloud Security: Dow Jones Exposes Millions of Users' Data

|

Names, addresses, account information, email addresses, and the last four digits of credit card numbers were accessible online.

READ MORE

Corelight Raises $9.2 Million for Bro-Based Security

|

The startup's Corelight Sensor product uses the open-source Bro security monitoring and network analysis platform to help businesses quickly resolve incidents.

READ MORE

Managing Insider Threats: Bupa Insurance Breach Affects 547,000 Customers

|

The incident was 'a deliberate act by an employee,' the company's managing director said.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Security and Accountability in the Cloud Data Center: A SANS Survey

The relentless march of end user organizations toward cloud services continues, despite long-standing fears about information security, the lack of visibility into cloud provider security controls, and the shortcomings of controls available to those who utilize cloud services. And while …

Mobile Application Management Platform Evaluation Checklist

Mobile application management (MAM) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed MAM provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, …

Carbonite: A Cornerstone for Ransomware Protection & Recovery

Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. …

Success Story: The Masiello Group Is Propelling Growth & Connectivity with UCaaS

The Masiello Group, a large regional provider of real estate and home ownership services, turned to Windstream for a flexible, scalable solution to connect their business with multiple offices across four states. In this case study video, hear how Windstream leveraged Ethernet, Data Center …
 
SEE ALL WHITEPAPERS
 
Twistlock Bolsters Container Security Platform with Cloud Native App Firewall

Twistlock Bolsters Container Security Platform with Cloud Native App Firewall

|

The company's new dynamic firewall technology ensures that only legitimate traffic gets through.

READ MORE
IBM Brings Always-On Encryption to the Z Mainframe

IBM Brings Always-On Encryption to the Z Mainframe

|

The mainframe has long been where mission-critical information is handled and now at long last all the information will be encrypted too.

READ MORE
A Reminder of Cloud Security Best Practices: Millions of Verizon Customers' Data Exposed

A Reminder of Cloud Security Best Practices: Millions of Verizon Customers' Data Exposed

|

Researcher Chris Vickery found customer names, addresses, account details and PINs on a publicly accessible server.

READ MORE
Sabre SynXis Breach Expands to Trump, Four Seasons, Hard Rock, Loews Hotels, Highlighting Need for Risk Management

Sabre SynXis Breach Expands to Trump, Four Seasons, Hard Rock, Loews Hotels, Highlighting Need for Risk Management

|

While the hotel chains themselves weren't targeted, their use of the SynXis reservations system exposed them to the breach.

READ MORE