dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Responding to Data Center Outages: 6 Keys to Developing an Effective Response Plan

As technology continues to evolve and grow more complex, so do the crises that arise when things go wrong. The root causes of outages have also been shifting in recent years, with cybercrime alone increasing 20%. Data center outages are becoming costlier for organizations, both financially …

Making the Move from AV to EPP: Evolve your program from lean-back to lean-forward

On-Demand WebinarAV and NGAV have built upon the idea of stopping known problems (or at least known unknowns). With a foundation of signatures and a light framework of behaviors of observed attacks, they tout a way to stop attacks. However, a simple glance at the news shows these tools …

Driving Toward the Automated SOC

Moving toward cloud-native computing infrastructure and production environments can’t happen without radical new approaches for security automation. The automated security operations center (SOC) is an innovative security operations model that enables enterprises to secure vast, …

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, …