dcsimg

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

The 2018 Cost of Data Breach Study: Impact of Business Continuity Management

This Ponemon research report analyzes the financial and reputational benefits of having a business continuity management (BCM) program in advance of a data breach. According to the research, BCM programs can reduce the per-capita cost of data breach, the mean time to identify (MTTI) and …

Magic Quadrant for the Wired and Wireless LAN Access Infrastructure

Evolving enterprise requirements for greater access layer intelligence and automation continue to challenge networking vendors. Network service application choices made for the wired and wireless LAN impact other enterprise end-user applications, such as collaboration platforms, as …

Has the Time Come for Network Managers to Say, “App Team Serve Thyself?”

Network operations teams have long been the backstop for keeping applications up and running. They’ve also been a vital part of securing them from attack. We all know a lot of application hacks can and should be prevented with secure code, but we also still see successful compromises …

Malwarebytes Transforms Vulnerability Telemetry with Redis Enterprise

Malwarebytes, the industry-leading anti-malware and internet security software company, also leads in innovative threat intelligence. The company uses cutting-edge techniques to collect information about malware and threats from around the globe. One such tool is the interactive …