The startup's "zero-touch" cloud workload security platform eliminates the need to fine-tune policies and pore over logs to secure cloud environments.
And a quarter of all targeted attacks were aimed at industrial targets, a recent study found.
And 51 percent believe the risk of mobile data loss is equal to or greater than that for PCs, a recent survey found.
Customer names, card numbers, expiration dates and verification codes were accessed by malware.
They lack the buzz of more recent security innovations, so network firewalls can be overlooked. Yet firewalls are an essential aspect of any security strategy. We cover the basics of network firewall technology and look at the latest in next-generation firewalls.
And 37 percent turn over complete control of keys and encryption processes to cloud providers, a recent survey found.
The latest version offers improved visibility into their application container environments and helps organizations ensure that they take security and compliance into consideration from the start.
That's far higher than 2016, when less than 60 percent said they planned to do so.
The use of VPNs and other tools to bypass security restrictions doubled from 2015 to 2016, a recent survey found.
Names, email addresses, home addresses, phone numbers, bank account numbers and sort codes were exposed.
Tens of thousands of dollars have been stolen from seller accounts, and fake items have been listed for sale in an effort to steal even more money.
The startup that enlists ethical hackers to combat cybersecurity threats attracts millions in funding from Microsoft and HPE.
There is money to be made in securing ICS.
The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.
Credit card data from online purchases made between September 2016 and February 2017 may have been accessed.