Please turn on your JavaScript for this page to function normally.
cloud computing
Where does your cloud data live? 3 questions to ask

There’s a common thread behind every security pro’s cloud-related fears: control. Whether your company’s infrastructure revolves around a cloud-centric strategy or regulates …

ransomware
Most businesses would not pay in the event of a ransomware attack

Business owners in the U.S. recognize the severity of ransomware and the potential disruption to business operations, yet 84 percent say they would not pay in the event of a …

Rule 41
Changes to Rule 41 will increase law enforcement hacking, surveillance

The Electronic Frontier Foundation (EFF), the Tor Project, and dozens of other organizations are calling on citizens and website operators to take action to block a new rule …

building
Supporting the IT edge is expensive, full of potential security risks

Organizations are facing multiple challenges when managing the IT edge – at remote and branch offices. A Riverbed survey asked IT professionals about the various challenges …

biohazard
Malware families attacking business networks continue to grow

The number of active global malware families increased by 15 percent in May 2016, according to Check Point. They detected 2,300 unique and active malware families attacking …

Binary
The hunting approach to defeating cyber attacks

Security used to be all about building walls around our organizations and trying to immediately stop all attacks. But today’s adversaries are sophisticated, persistent, and …

healthcare
Healthcare needs a data centric security approach

With increasing attacks on PHI data, coupled with more stringent data security requirements and regular audits, organizations should act now – before it’s too late. A recent …

Red Hat
Red Hat launches Ansible-native container workflow project

Red Hat launched Ansible Container under the Ansible project, which provides a simple, powerful, and agentless open source IT automation framework. Available now as a …

CEO
How to assess your stakeholder matrix as part of a cloud security strategy

Running your organization in the cloud has many benefits: cost savings, efficiency gains, and the flexibility to scale, to name a few, along with some security drawbacks. This …

box
Rethink network security outside the box

Preventing bad guys from compromising an organization has historically been executed based on a basic concept: establish a perimeter, and control who and what goes in and out. …

abstract
Hyperconverged infrastructure adoption is accelerating

The hyperconverged infrastructure is increasingly being adopted by enterprise and midmarket companies to reduce data center costs and improve operational efficiency, according …

traffic
Week in review: Smart TV ransomware, DNC hack, and DAO under attack

Here’s an overview of some of last week’s most interesting news and articles: Ransomware targets Android smart TVs If you own a Sharp and Philips smart TV running …

Don't miss

Cybersecurity news