News - Article Archives - Page 21

Radware Floats Cloud DDoS Protection Service

March 29, 2017 |

Like today's craftier attackers, Radware's new offering takes a targeted approach to blocking DDoS attacks on AWS and Azure applications.

READ MORE

Application Firewalls: Protecting Web Applications from Attacks

March 29, 2017 |

Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE

1.4 Billion Data Records Exposed in 2016

March 29, 2017 |

That's an increase of 86 percent over the previous year, according to Gemalto.

READ MORE

Cybersecurity Pros Brace for Non-Malware Attacks

March 28, 2017 |

Today's IT security experts are wary about much more than dangerous viruses and other malware, finds a new survey from Carbon Black.

READ MORE

CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

March 28, 2017 |

More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.

READ MORE

Cybercriminals See 95 Percent Profit from DDoS Attacks

March 28, 2017 |

DDoS-as-a-service providers can launch attacks for as little as $7 an hour, according to a recent report.

READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017 |

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE

Sophos Intercept X Brings an End to Ransomware

March 27, 2017 |

Intercept X from Sophos brings a bandolier of silver bullets to the ransomware fight, leaving cybercriminals scattering for cover.

READ MORE

Massive Data Breach Exposes 4.8 Million Job Seekers' Personal Info

March 27, 2017 |

Names, Social Security numbers and birthdates were accessed.

READ MORE

Network Access Control: Restricting and Monitoring Access to Your Network and Data

March 24, 2017 |

Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.

READ MORE

Apple Attributes Alleged iCloud Hack to Password Reuse

March 24, 2017 |

The allegedly compromised account information may have come from the LinkedIn breach.

READ MORE

Security Flaws Found in LastPass Extensions for Chrome, Firefox

March 23, 2017 |

The vulnerabilities, uncovered by security researcher Tavis Ormandy, were patched quickly.

READ MORE

Incident Response: How to Prepare for Attacks and Breaches

March 23, 2017 |

Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

TrackVia Combines Low-Code Apps with Security Best Practices

March 22, 2017 |

The drive to digital transformation encourages use of low-code application development platforms, but these tools often overlook security, leaving enterprises exposed to unknown threats. TrackVia injects security back into the application development equation using a low-code platform that speeds development yet institutes protection.

READ MORE

Saks Fifth Avenue, Three U.K. Mistakenly Expose Customer Data

March 22, 2017 |

In both cases, the information appears to have been exposed by mistake, not by an external or internal attack.

READ MORE

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

March 21, 2017 |

Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

Beware of Sleeper Fraud Accounts

March 21, 2017 |

Datavisor Online Fraud report finds that a non-trivial percentage of fraud activity occurs from accounts that are inactive for a week before an attack.

READ MORE

MajikPOS Malware Currently Infecting U.S. Point-of-Sale Systems

March 21, 2017 |

The malware began infecting businesses across North America in late January.

READ MORE

Understanding Ransomware Vectors Key to Preventing Attack

March 20, 2017 |

Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.

READ MORE

Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

March 20, 2017 |

Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.

READ MORE