dcsimg

Network Security - Article Archives - Page 15

Massive SEC Breach Highlights Need for Broader Use of Encryption

September 25, 2017 |

A recent study found that less than 1 percent of stolen data records are protected with encryption.

READ MORE

Twistlock 2.2 Enhances Container Security Visibility with Incident Explorer

September 22, 2017 |

The new Incident Explorer feature turns discrete event data into actionable security intelligence.

READ MORE

Equifax Executives' Passwords for Sale Online, Web Portal Left Exposed

September 21, 2017 |

For the credit bureau that recently suffered a massive data breach, the news just keeps getting worse.

READ MORE

EiQ Networks, Now Called Cygilant, Nabs $7 Million in Funding

September 21, 2017 |

EiQ Networks, Now Called Cygilant, Nabs $7 Million in Funding

READ MORE

Compliance and Data Privacy Regs IT Security Pros Should Worry About

September 19, 2017 |

GDPR is the latest compliance and data privacy reg to affect IT security. We list more than a dozen that may affect your organization – along with legal issues and GRC solutions to consider.

READ MORE

Aqua Security Secures $25 Million in Funding for Container Security

September 19, 2017 |

The startup sets a record for container security funding amid intensifying demand from enterprises.

READ MORE

Cloud Security Error Exposes Half a Million Voters' Personal Information

September 19, 2017 |

The exposed data, part of TargetSmart's VoterBase, belonged to third party vendor Equals3.

READ MORE

Threat Stack Raises $45M to Advance Security Platform

September 19, 2017 |

Total funding to date now stands at $70M as the company continues to grow.

READ MORE

84 Percent of IT Pros Say Threat Intelligence is Key to Security

September 18, 2017 |

Still, 69 percent say the data is too voluminous and complex to be actionable, a recent survey found.

READ MORE

AppGuard Completes $30 Million Funding Round

September 17, 2017 |

The endpoint security specialist plans to seal the deal on an acquisition and target customers in both the enterprise and SMB markets.

READ MORE

U.S. Government Bans Use of Kaspersky Software

September 15, 2017 |

Executive branch departments and agencies have 90 days to remove and discontinue use of all Kaspersky products.

READ MORE

Equifax Breach Highlights Potential Impact of GDPR

September 14, 2017 |

Were the regulation already in effect, the company could have faced more than $120 million in fines.

READ MORE

WhiteHat Launches Secure DevOps Learning Labs

September 14, 2017 |

The new online learning and resource hub helps enterprise developers build secure apps from the start.

READ MORE

Cybrary Raises $3.5 Million to Fill Cybersecurity Skills Gap

September 12, 2017 |

The online training provider raises millions to help IT professionals and job seekers gain some much-needed cybersecurity expertise.

READ MORE

Unpatched Open Source Software Flaw Blamed for Massive Equifax Breach

September 12, 2017 |

The Apache Struts security flaw had been disclosed in March of 2017.

READ MORE

Protecting Big Data: Over 26,000 MongoDB Servers Hit by Ransom Attacks

September 11, 2017 |

In many cases, companies that paid the ransom were scammed -- the data had simply been wiped.

READ MORE

IoT Security Startup Axonius Raises $4 Million

September 10, 2017 |

The Israeli company is plugging the network visibility and management gaps that can lead to an attack on a business' IoT devices.

READ MORE

SANS Updates Phishing Awareness Training Offering

September 08, 2017 |

SANS Phishing Training offers tools that help organizations measure the effectiveness of their phishing awareness efforts.

READ MORE

Equifax Web Application Vulnerability Exposes 143 Million Social Security Numbers

September 08, 2017 |

The exposed information also includes names, birthdates and addresses, as well as some driver's license numbers, credit card numbers and other data.

READ MORE

Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy

September 06, 2017 |

Deception technology is becoming a critical IT security defense strategy. We outline how deception tools work and the vendors to watch.

READ MORE