dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Driving Toward the Automated SOC

Moving toward cloud-native computing infrastructure and production environments can’t happen without radical new approaches for security automation. The automated security operations center (SOC) is an innovative security operations model that enables enterprises to secure vast, …

Making the Move from AV to EPP: Evolve your program from lean-back to lean-forward

On-Demand WebinarAV and NGAV have built upon the idea of stopping known problems (or at least known unknowns). With a foundation of signatures and a light framework of behaviors of observed attacks, they tout a way to stop attacks. However, a simple glance at the news shows these tools …

Securing Office 365 Vulnerabilities with Okta

Office 365 is a highly targeted application for hackers because it is widely deployed across industries. Okta’s security team commonly sees customers experiencing phishing, password spraying, and brute-force attacks, to name a few. Office 365 uses several authentication …

Securing the Internet of Healthcare Things

The Internet of Things (IoT), a growing network of physical devices with Internet connectivity, can collect and exchange rich data. Organizations utilizing the Enterprise of Things (EoT) are also at a greater risk for data breaches and cybersecurity threats. Healthcare organizations …