dcsimg

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Ovum Report – XM Cyber on the Radar

XM Cyber has developed a technology that identifies and exposes all attack vectors. These include lateral movement from breach points to an organization's critical assets, otherwise left undetected by security controls. It delivers automated and continual simulation of red team …

How to Protect Government Users from the Most Common Attack Methods

IT organizations in the government sector realize their users have a giant bullseye on their backs. Through government users, criminal organizations and hostile nation-states can gain access to sensitive and valuable information, attempt to influence policy, and more. Our panel discusses …

IDC Futurescape

IT leaders have never had so much choice in their infrastructure strategies, both on-premises and in a hybrid or off-premises world. With this choice comes the potential to positively impact budgets, staffing, operational effectiveness, and business outcomes. This IDC study …

Vulnerability Decoder – Insecure Open Source Components

88% of Java applications have at least one vulnerability component. Open source and commercial, third-party components are the building blocks of applications, but developers frequently don’t know which components are in their applications, making it difficult to update components …