January 31, 2024
Via: SecureWorldCyber risk is an existential issue for companies of all sizes and in all industries. The integration of technology and automation, and related collection, use, and sharing of information into everyday business practices presents an enormous opportunity for efficiency and […]
June 30, 2023
Via: Help Net SecurityAttain Insight released Attain Insight Security 4X version 4.0, an upgrade to its flagship security software. This latest release introduces new features and enhancements designed to fortify data protection, streamline compliance processes, and bolster user management across diverse enterprise environments. […]
Application security, Security
September 24, 2021
Via: Help Net SecurityEnterprises worldwide continue to migrate from proprietary, licensed software to software-as-a-service (SaaS) subscriptions as they seek innovation, better user experience and lower cost, according to a report published by Information Services Group (ISG). The report on the global market finds […]
March 14, 2017
Via: Dark ReadingReports of a pair of isolated mobile malware outbreaks at two large companies yet again calls into question the security of the Android device supply chain. The mobile security research team with Check Point Software Technologies found several dozen devices […]
March 9, 2017
Via: TrendMicro BlogOver the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these […]
February 22, 2017
Via: Help Net SecurityThe traditional meaning of an insider threat is when a current employee or contractor with authorized access to a secure network intentionally or accidently misuses it to carry out a malicious activity. This type of activity can include sabotage, theft, […]
February 22, 2017
Via: InfoWorldAsk a security professional about infosec challenges, and you’ll get an earful of complaints about everyone else: Users click on bad links and open attachments, developers release buggy code, IT lags in applying software patches, the C-suite doesn’t understand security […]
December 9, 2016
Via: Symantec ConnectMalicious PowerShell scripts are on the rise, as attackers are using the framework’s flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger […]
November 29, 2016
Via: TrendMicro BlogWhile most enterprises are becoming more aware of threats like ransomware and DDoS attacks, very few know that they are also at risk of economic espionage; much less of associated tools like espionage-as-a-service offerings that attackers can easily avail of […]
October 31, 2016
Via: Help Net SecurityToday’s enterprises are increasingly moving to the cloud to transform internal IT environments, but are struggling to manage the complexity, according to 451 Research and Embotics. More than 75 percent of enterprises are using multiple clouds, including public and private. […]
Cloud security, Network security
October 26, 2016
Via: Computer WeeklyMany organizations that are combining application development and systems operations teams are failing to improve security with this DevOps approach, a study has revealed. This is despite the promise of more secure software development by enabling organizations to find and […]
October 5, 2016
Via: Computer WeeklyMobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson. Enterprises should look to over-the-top (OTT) mobile systems to ensure their mobile […]
July 25, 2016
Via: CSO OnlineWe live in an era where increasingly sophisticated cyber-criminals are regularly on the prowl for network vulnerabilities. So how can business respond to their slick phishing emails and social engineering ruses? One school of thought within cyber-security circles argues for […]
July 7, 2016
Via: Help Net SecurityOnly a fifth of IT decision makers in large multinational corporations are confident that their organization is fully prepared against the threat of cybercriminals. The vast majority of companies feel constrained by regulation, available resources and a dependence on third […]
July 1, 2016
Via: InfoSecurity LiveEmail security is a major concern in enterprises where transmission and storing of email is snooped by the hackers. The only way to strengthen is to follow the best security practices with respect to the service providers. In the enterprise, […]
June 22, 2016
Via: Russel EdwardsWhen two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud. The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the […]
Network security, Vulnerabilities
June 1, 2016
Via: TrendMicro BlogA a lot of enterprises today are not fully prepared for securing or managing their blind spot “SSL traffic” into the network. Because SSL has traditionally been beyond the reach of network security systems it has become a serious security […]
March 16, 2016
Via: TrendMicro BlogOver the last 20 years, technology advancements, globalization and the Internet have revolutionized business practices and efficiency. Supply chain management is one of the areas that has benefitted most, as companies can now work with suppliers and business partners around […]
February 29, 2016
Via: InfoSecurity LiveMicrosoft has enhanced the holistic agile security platform it touted last November with integrated insights obtained from the company’s intelligent security graph and tighter collaboration with industry partners. The changes highlight Microsoft’s current approach to enterprise security, which focuses on […]
September 23, 2015
Via: cloud-securityAs #enterprises increasingly weave a growing number of outside #cloud providers into the fabric of today’s #it infrastructure, visibility into cloud provider operations and security controls reigns as the number one #cloud security concern, according to a recent survey conducted […]