Please turn on your JavaScript for this page to function normally.
fingerprint
Similarities in partial fingerprints may trick biometric security systems

No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of …

magnifying glass
Network teams spend more time on data security amidst new threats

Enterprise network teams are expending more time and resources than ever before to battle security threats, according to Viavi Solutions, who surveyed 1,035 CIOs, IT …

programmer
Cyber insecurity is pervasive, citizens feeling concerned and vulnerable

More than three-quarters of U.S. citizens (79 percent) are concerned about the privacy and security of their personal digital data, and 63 percent say they would feel more …

money
Worldwide IT spending to grow 1.4 percent in 2017

Worldwide IT spending is projected to total $3.5 trillion in 2017, a 1.4 percent increase from 2016, according to Gartner. This growth rate is down from the previous …

Microsoft cloud
Compared to last month’s Patch Tuesday, April will be a light drizzle

March saw a sizable release from Microsoft after a missed Patch Tuesday. Any way about it, April will be a lighter month than March. Windows 10 1703 has officially released to …

cloud computing
Cloud IT infrastructure spend grew to $32.6 billion in 2016

According to IDC, vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public and private cloud, grew by 9.2% …

arrow
Week in review: Highest paying IT certifications, emergency iOS patch, and how attackers exploit whitelists

Here’s an overview of some of last week’s most interesting news and articles: Windows 10 Creators Update will come with clearer privacy options Nearly two years …

abstract
Threat intelligence sharing challenges: Understand the context of cyber events

A new McAfee report details the challenges facing threat intelligence sharing efforts. The growing complexity of the technology environment is a very important driver for …

strategy
Oil and gas companies’ cybersecurity strategies are evolving

Lacking enterprise-wide cyber analytics technology to monitor for cyberattacks, most oil and gas companies are not fully aware of when or even how cyberattacks might affect …

Hybrid infrastructure services
Extensive shift to hybrid infrastructure services is underway

The growth of cloud and industrialized services and the decline of traditional data center outsourcing (DCO) indicate a massive shift toward hybrid infrastructure services, …

bot
Video: TinyNuke botnet explained

In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …

numbers
23% of security pros are blind to encrypted traffic threats

According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools