October 22, 2018
Via: Help Net SecurityA majority of companies (54 percent) are worried that they will soon outgrow their security solutions, according to Threat Stack. While budgets are expected to increase by 19 percent over the next two years, organizations are struggling with a disconnect […]
October 8, 2018
Via: Help Net SecurityWorldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to gradually slow over the 2017-2022 forecast period, the market will still deliver a compound annual […]
November 17, 2016
Via: Threat PostOne thing technologists overtly shun is the prospect of government regulation. But recent DDoS attacks carried out by botnets of connected things have spooked some people of influence in security to the point where intervention by lawmakers may be inevitable. […]
November 16, 2016
Via: Russel EdwardsMarketsandMarkets, as quoted by Help Net Security, recently reported that the adaptive security market will gain considerable traction in the next five years. This success comes from the need to defend networks and IT systems against advanced threats. The expected […]
October 7, 2016
Via: Help Net SecurityA preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security fatigue is a real thing. Security fatigue – weariness from dealing with […]
August 4, 2016
Via: Help Net SecurityCyberArk Labs tested over 23,000 ransomware samples from more than 30 prevalent malware families, including Cryptolocker, Petya and Locky, in order to better understand common infection, encryption and removal characteristics, and identify potential strategies for mitigating the impact of ransomware […]
May 24, 2016
Via: CIONow when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do. These options include both hardware and software […]
May 20, 2016
Via: Security WeekIndustrial networking, computing and automation solutions provider Moxa has released a firmware update for one of its industrial secure routers to address several high severity vulnerabilities that can be exploited for denial-of-service (DoS) attacks, privilege escalation, and arbitrary code execution. […]
February 23, 2016
Via: Security IntelligenceThe Internet of Things (IoT), commonplace devices connected to each other to become more than the sum of their parts, is quickly becoming an exciting reality. However, there are connectivity, interoperability, management, scalability, privacy and security challenges that require a […]
February 22, 2016
Via: Security IntelligenceEngaging with any IT vendor around mobile security will invariably lead to the conclusion that there are many tools available. It’s at this time that some simple qualification can determine whether the vendor has a solution that addresses your enterprise […]
February 5, 2016
Via: Tech Republic“Humans suck at choosing passwords,” writes security pundit Graham Cluley. That is hard to argue according to SplashData (TeamsID), which reported on 2015’s worst passwords, with 123456 and password ranking as the most commonly used passwords. “In SplashData’s fifth annual […]
November 11, 2015
Via: CSO OnlineData privacy law is murky since Europe’s highest court struck down the Safe Harbor agreement long used between the U.S. and Europe. Some cloud storage vendors now plan to help enterprises adjust to the new reality. Last week, Amazon announced […]
August 19, 2015
Via: threats-and-malwareMost cybersecurity work is geared towards finding ways to prevent intrusions – passwords, two-factor authentication, firewalls, to name a few – and to identify the “chinks in the armor” that need to be sealed. The characteristics of malware are shared […]
August 19, 2015
Via: Russel Edwards#tokenization translates as replacing sensitive data elements with their non-sensitive equivalents. The value of the resulting elements being non-exploitable, this #security procedure is supposed to reduce the risks. In order to retrace the steps back to the original sensitive data, […]
April 22, 2024
April 18, 2024
April 24, 2024