LATEST SECURITY NEWS AND ANALYSIS

Threat Intelligence Firm ThreatQuotient Attracts $30 Million in Funding

The cybersecurity startup gets the attention of Cisco and Japanese telecommunications company NTT Docomo.

Read More

Flood of Attacks Spread Ransomware via Remote Desktop Protocol

The attacks present a particular threat to small businesses.

Read More

SecTor: What the Story of David vs Goliath Teaches Cyber-Security

While offensive attacks and zero-day vulnerabilities often grab headlines, understanding risk is the key to security.

Read More

TOP IT SECURITY RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

Read More

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Read More

Hacking Blockchain with Smart Contracts to Control a Botnet

Hacking Blockchain with Smart Contracts to Control a Botnet

|

Botract attack method revealed at SecTor security conference could enable a botnet to be as resilient and as distributed as the Ethereum blockchain itself.

READ MORE
Fear the Retailer: Forever 21 Hacked as Black Friday Approaches

Fear the Retailer: Forever 21 Hacked as Black Friday Approaches

|

The company doesn't yet know how many locations were affected.

READ MORE
Barracuda Floats Cloud Generation Firewalls

Barracuda Floats Cloud Generation Firewalls

|

The company's updated NextGen Firewall and Web Application Firewall offerings are now ready to tackle cloud application security challenges.

READ MORE
How to Achieve an Optimal Security Posture

How to Achieve an Optimal Security Posture

|

Complete and total security is out of the question, so which IT security technologies will get you to your ideal security posture? We outline your options.

READ MORE

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

ENTERPRISE MOBILITY MANAGEMENT (EMM)

Mobile end-user devices need to be managed to improve employee productivity and to reduce risks.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Five Steps to Start and Build an AppSec Program

Whether a mandate to secure all web and mobile apps comes from a newly enlightened CIO or in response to a major security breach, beginning even a small application security program can be a daunting task. How will you know how many digital assets you have, let alone their risk …

2017 Network Security Brief: Insights and Best Practices for Outsmarting Modern Threats

As enterprises move toward more complex network environments, centralization of security and network operations becomes a priority, given the need for visibility to rapidly counter incidents and attacks on critical assets. Without proper visibility into unknown threats, organizations rely …

Building Secure Multi-Factor Authentication

As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.

Making Security Profitable for Your Service Provider Business

Trust is the most important element in your client relationships, and effective data and network security require you to build a chain of trust that links together every step — from the origin of a data transmission to the destination and back. The chain starts at the endpoint client …
 
SEE ALL WHITEPAPERS
 
45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

|

Still, 89 percent say they're confident in their organization's cyber security stance.

READ MORE
How the Government  of Canada Plans To Set CyberSecurity Policy

How the Government of Canada Plans To Set CyberSecurity Policy

|

At SecTor security conference, the Director General for National Cyber Security in the Government of Canada details her government's policies for keeping Canadians safe online.

READ MORE
Eavesdropper Flaw, Marcher Malware Threaten Mobile Devices

Eavesdropper Flaw, Marcher Malware Threaten Mobile Devices

|

The vulnerability and phishing attack should both be easy to resolve -- but they're thriving.

READ MORE
NeuVector Courts Large-Scale Enterprise Container Deployments

NeuVector Courts Large-Scale Enterprise Container Deployments

|

Version 1.3 of the application container security solution marks the arrival of a new Enterprise edition.

READ MORE