dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Driving Toward the Automated SOC

Moving toward cloud-native computing infrastructure and production environments can’t happen without radical new approaches for security automation. The automated security operations center (SOC) is an innovative security operations model that enables enterprises to secure vast, …

Securing Office 365 Vulnerabilities with Okta

Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few. Office 365 uses several authentication …

Securing the Internet of Healthcare Things

The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations …

Responding to Data Center Outages: 6 Keys to Developing an Effective Response Plan

As technology continues to evolve and grow more complex, so do the crises that arise when things go wrong. The root causes of outages have also been shifting in recent years, with cybercrime alone increasing 20%. Data center outages are becoming costlier for organizations, both financially …