Network Security - Article Archives - Page 7

New Anthem Breach Underscores the Need for Effective Cyber Risk Management

August 03, 2017 |

An insider breach at a third party vendor exposed thousands of Anthem members' PHI.

READ MORE

HBO Hack Highlights Importance of Encryption, Data Governance

August 02, 2017 |

1.5 TB of data, including unreleased episodes of upcoming shows, was stolen and leaked online.

READ MORE

Forcepoint CASB Spots Suspicious User Behavior

August 01, 2017 |

Forcepoint adds new visibility into employees in multi-cloud enterprise environments.

READ MORE

Why You Need Multi-Factor Authentication: Virgin America Hacked Post-Merger

July 31, 2017 |

The hacker accessed 3,120 employees' and contractors' user names and passwords.

READ MORE

Why Risk Management Matters: Hackers Breach Italy's Biggest Bank Twice in One Year

July 27, 2017 |

400,000 UniCredit customers' personal information was exposed in two separate incidents.

READ MORE

Capsule8 Goes Cloud-Native and Container-Aware for Threat Prevention and Response

July 26, 2017 |

Built for production clouds, Capsule8 Protect provides continual threat detection and blocks attacks on containerized environments.

READ MORE

Managing Third Party Risk: Outside Law Firm Exposes Wells Fargo Client Data

July 26, 2017 |

The data exposed ranges from high net worth clients' financial details to financial advisors' compensation information and client lists.

READ MORE

CrowdStrike Debuts Cybersecurity Search Engine Technology at Black Hat

July 25, 2017 |

Security vendor debuts a new capability that will accelerate time to resolution for incident investigations.

READ MORE

Black Hat: The Next Generation of Red and Blue Security Testing is Purple Team

July 25, 2017 |

Accenture Security details a new approach to improve incident management and response.

READ MORE

Intrusion Detection and Prevention Startup Bricata Raises $8 Million

July 25, 2017 |

The company's multi-pronged, AI-enhanced intrusion detection and prevention attracts VC funding.

READ MORE

Six Top CASB Vendors

July 25, 2017 |

A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review six top CASB products.

READ MORE

Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

July 25, 2017 |

Vehicle registration data for every Swedish citizen was exposed -- including those under witness protection.

READ MORE

IBM's X-Force Red Targets IoT Threats

July 24, 2017 |

Big Blue penetration-testing team will help enterprise customers shore up their IoT and connected-car systems.

READ MORE

Fortinet Debuts Global Threat Intelligence Service in Beta

July 24, 2017 |

New service aims to provide cyber-situational awareness of emerging threats.

READ MORE

Cybersecurity Analysis Company Insight Engines Raises $15.8 Million

July 20, 2017 |

The makers of Cyber Security Investigator for Splunk attract millions in VC funding as it eyes other markets.

READ MORE

Fear the Internet of Things: Devil's Ivy Security Flaw Impacts Millions of IoT Devices

July 20, 2017 |

The vulnerability can be exploited to view a device's video feed or to deny the owner access to the feed.

READ MORE

Corelight Raises $9.2 Million for Bro-Based Security

July 18, 2017 |

The startup's Corelight Sensor product uses the open-source Bro security monitoring and network analysis platform to help businesses quickly resolve incidents.

READ MORE

Eight Top Threat Intelligence Companies

July 18, 2017 |

Threat intelligence platforms have become a critical security tool as the volume and complexity of threat vectors grows exponentially. We review the top vendors in this critical area.

READ MORE

Managing Insider Threats: Bupa Insurance Breach Affects 547,000 Customers

July 18, 2017 |

The incident was 'a deliberate act by an employee,' the company's managing director said.

READ MORE

Twistlock Bolsters Container Security Platform with Cloud Native App Firewall

July 17, 2017 |

The company's new dynamic firewall technology ensures that only legitimate traffic gets through.

READ MORE