LATEST SECURITY NEWS AND ANALYSIS

Fear the Retailer: Forever 21 Hacked as Black Friday Approaches

The company doesn't yet know how many locations were affected.

Read More

Barracuda Floats Cloud Generation Firewalls

The company's updated NextGen Firewall and Web Application Firewall offerings are now ready to tackle cloud application security challenges.

Read More

How to Achieve an Optimal Security Posture

Complete and total security is out of the question, so which IT security technologies will get you to your ideal security posture? We outline your options.

Read More

TOP IT SECURITY RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

Read More

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Read More

45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

|

Still, 89 percent say they're confident in their organization's cyber security stance.

READ MORE
How the Government  of Canada Plans To Set CyberSecurity Policy

How the Government of Canada Plans To Set CyberSecurity Policy

|

At SecTor security conference, the Director General for National Cyber Security in the Government of Canada details her government's policies for keeping Canadians safe online.

READ MORE
Eavesdropper Flaw, Marcher Malware Threaten Mobile Devices

Eavesdropper Flaw, Marcher Malware Threaten Mobile Devices

|

The vulnerability and phishing attack should both be easy to resolve -- but they're thriving.

READ MORE
NeuVector Courts Large-Scale Enterprise Container Deployments

NeuVector Courts Large-Scale Enterprise Container Deployments

|

Version 1.3 of the application container security solution marks the arrival of a new Enterprise edition.

READ MORE

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

ENTERPRISE MOBILITY MANAGEMENT (EMM)

Mobile end-user devices need to be managed to improve employee productivity and to reduce risks.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Hybrid Cloud for Dummies

In this book, learn the fundamentals of hybrid cloud: Manage visibility, control and security Handle deployments in hybrid cloud environments Realize and recognize the business impact of hybrid cloud

Ironstream® in the Real-World for ITOA, ITSI, SIEM

New technologies and products have emerged that enable organizations to capture mainframe information and quickly move it to an open-system based analytic platform where it can be integrated, correlated, and analyzed to detect for anomalies and issues, and visualized using a platform that …

2017 Network Security Brief: Insights and Best Practices for Outsmarting Modern Threats

As enterprises move toward more complex network environments, centralization of security and network operations becomes a priority, given the need for visibility to rapidly counter incidents and attacks on critical assets. Without proper visibility into unknown threats, organizations rely …

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …
 
SEE ALL WHITEPAPERS
 
Skills Shortage is a Key Factor in Data Breaches, Cyber Security Pros Say

Skills Shortage is a Key Factor in Data Breaches, Cyber Security Pros Say

|

62 percent of security professionals say their organization simply doesn't provide sufficient training for its cyber security staff.

READ MORE
Security Applications of Blockchain

Security Applications of Blockchain

|

Certificate authorities, key signings and DNS records are some of the ways Blockchain could make data and the web more secure and prevent DDoS attacks.

READ MORE
79 Percent of Companies Have No Plan in Place for GDPR

79 Percent of Companies Have No Plan in Place for GDPR

|

23 percent haven't yet determined whether it's relevant to their organization.

READ MORE
Barracuda Acquires Sonian for Email Intelligence and Security

Barracuda Acquires Sonian for Email Intelligence and Security

|

The deal will lend visibility into how the email habits of users align with a business' security, legal and compliance requirements.

READ MORE