News - Article Archives - Page 17

Encryption: Securing Sensitive Data in Changing Corporate Environments

May 05, 2017 |

As corporate data moves beyond the firewall and into the cloud and Internet of Things, encryption becomes more important than ever. We cover everything from encryption basics to solutions.

READ MORE

Google Responds to Massive Google Docs Phishing Attack

May 05, 2017 |

The company says it's working to prevent a similar attack from happening again.

READ MORE

CA Technologies Uses AI Tech to Combat Online Fraud

May 04, 2017 |

The company's new CA Risk Analytics Network uses machine learning and neural network technologies to curb online credit card fraud.

READ MORE

Types of DDoS Attacks

May 04, 2017 |

Distributed Denial of Service Attacks (DDoS) can shut down your websites and network. We list the different types of DDoS attacks and offer resources to stop DDoS attacks.

READ MORE

Shodan Partners with Recorded Future to Detect Botnets and RATs

May 04, 2017 |

Widely uses search tool adds Malware Hunter crawler that can help to discover Remote Access Trojans (RATs)

READ MORE

Sabre Breach May Have Exposed Payment Data at 36,000 Hotels

May 04, 2017 |

The company recently identified unauthorized access to payment information processed through its SynXis Central Reservation system.

READ MORE

BMC Launches SecOps Response Service for 'Cloudy' Enterprises

May 03, 2017 |

The security and compliance platform banishes security blind spots for businesses that have embraced a multi-cloud approach to IT.

READ MORE

Beyond the Backup: Defending Against Ransomware

May 03, 2017 |

Recovering successfully from ransomware means more than just restoring from backup.

READ MORE

Financial Services Was the Most-Attacked Industry in 2016

May 02, 2017 |

The average financial services organization experienced 65 percent more cyber attacks than the average organization across all industries.

READ MORE

Hacker Arrested for Stealing $100 Million from Facebook and Google

May 01, 2017 |

Evaldas Rimasauskas allegedly used phishing attacks to trick the companies into transferring tens of millions of dollars to accounts he controlled.

READ MORE

Cloudflare Nukes IoT Security Threats from 'Orbit'

April 28, 2017 |

The company's new service keeps IoT devices, even ones riddled with vulnerabilities, out of a hacker's grasp.

READ MORE

Russian Hackers Target French Presidential Campaign

April 28, 2017 |

The attacks are the invisible side of a Russian campaign against Emmanuel Macron, his digital director said.

READ MORE

Chipotle Hit by Credit Card Breach

April 27, 2017 |

All customers who paid with a credit or debit card at a Chipotle location between March 24, 2017 and April 18, 2017 may be affected.

READ MORE

Hackers Aim High to Hack the U.S. Air Force

April 26, 2017 |

Latest program in HackerOne-backed U.S military bug bounty effort takes aim at the USAF.

READ MORE

87 Percent of Companies Plan to Invest in Security-as-a-Service in the Next 12 Months

April 26, 2017 |

40 percent expect their network security spending to increase by 10 to 20 percent over the next year, a recent survey found.

READ MORE

Twistlock Raises $17M for Container Security

April 25, 2017 |

The funds will help the application container security startup expand into more markets and grow its product.

READ MORE

Penetration Testing: DIY or Hire a Pen Tester?

April 25, 2017 |

The best approach may be to do both: Hire a pen tester to get started, and learn to do it yourself for ongoing penetration testing. We give you everything you need to know about DIY and third-party pen testing.

READ MORE

Russian Hacker Sentenced to 27 Years in U.S. Prison

April 25, 2017 |

Roman Seleznev, the son of a Russian MP, caused over $169 million in damages by installing malware on point-of-sale machines.

READ MORE

Securing Docker, One Patch at a Time

April 24, 2017 |

The open-source Docker container project integrates many different security approaches, but like every other software project, it still has to deal with reported software vulnerabilities.

READ MORE

Lacework Emerges from Stealth with Polygraph Cloud Security

April 24, 2017 |

The startup's "zero-touch" cloud workload security platform eliminates the need to fine-tune policies and pore over logs to secure cloud environments.

READ MORE