Latest news - Page 753
The time for micro-segmentation is now
Mon, 7th Mar 2016
#
micro-segmentation
#
opinion
#
cyber attacks
In the wake of costly breaches, it's whole-system micro-segmentation that is set to redefine cybersecurity this year.
Security: The biggest benefit and challenge of cloud computing
Mon, 7th Mar 2016
#
cybersecurity
#
cloud services
#
mobility
Cloud security is a top concern for many British enterprises, with 31% identifying it as the most prevalent challenge, according to a survey by Clutch.
The surprisingly scary patterns revealed in hack attacks
Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.
Healthcare organisations buckle under pressure of cyber attacks
Wed, 2nd Mar 2016
#
malware
#
ddos
#
breach prevention
Healthcare sector unprepared for cyber attacks, averaging one per month, according to ESET and the Ponemon Institute.
Point-of-sale malware attacks still strong in 2016
Wed, 2nd Mar 2016
#
malware
#
martech
#
commerce systems
Point-of-sale breaches will continue to be a major issue in the IT world in 2016, according to security firm Carbon Black.
FireEye and ForeScout enter strategic partnership
Wed, 2nd Mar 2016
#
uc
#
partner programmes
#
breach prevention
FireEye and ForeScout Technologies have partnered to combine advanced threat detection with device visibility for better threat response.
New study shows CISOs not confident in their ability to protect
Wed, 2nd Mar 2016
#
isaca
#
rsa security
#
candidates
Cybersecurity professionals aren't confident in the ability of their teams to protect organisations beyond basic incidents according to a new report.
Centrify ups fight against enterprise attacks with 'MFA Everywhere'
Wed, 2nd Mar 2016
#
mfa
#
iaas
#
iam
Centrify has launched a new initiative to secure enterprise identities against the most prevalent source of cyber attacks - compromised credentials.
Is there a way to sync, share and control data securely?
Wed, 2nd Mar 2016
#
storage
#
data protection
#
dr
As employees and partners collaborate through file sync and sharing services, sensitive data is often put at risk of compromise and non-compliance.
IBM doubles down on security with latest acquisition
Tue, 1st Mar 2016
#
cybersecurity
#
healthtech
#
ibm
IBM Security is set to expand its operations with the acquisition of Resilient Systems, specialists in security incident response solutions.
Going mobile: How to have secure file-sharing, backup recovery and access
Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.
Stop bullying Apple around and start doing some intelligence homework
Tue, 1st Mar 2016
#
apple
#
it industry
#
fbi
The FBI should stop bullying Apple and the technology industry and spend their time and energy instead on figuring out other ways of investigating.
Wireless home security market to reach $32 billion by 2019
Mon, 29th Feb 2016
#
network infrastructure
#
sdn
#
smart home
The emergence of customised solutions and integrated packages will significantly boost the global wireless home security market until 2019.
Endpoint data protection: A buyer's checklist
Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
No such thing as perfect security, FireEye report finds
Mon, 29th Feb 2016
#
advanced persistent threat protection
#
breach prevention
#
cybersecurity
While disruptive attacks are on the rise, the time between a company being compromised and discovery of the attack is continuing to drop.
Two Kiwis recognised for cyber resilience work on global stage
Fri, 26th Feb 2016
#
risk & compliance
#
cybersecurity
#
risk management
Marsh brokers become first New Zealanders to receive cyber resilience accreditation from AXELOS. #cybersecurity.
Can your iPhone be hacked using just Play-Doh? Yep.
Fri, 26th Feb 2016
#
biometrics
#
apple
#
apple iphone
Touch ID may not be as secure as you thought, with a mobile security company getting around the security with an unlikely partner in crime: Play-Doh.
Arbor brings order to the chaos with new security platform
Fri, 26th Feb 2016
#
uc
#
cybersecurity
#
customers
Arbor Networks introduces new security platform to detect and investigate advanced cyber-threats in real-time.
SAP security breaches are on the rise, so what's being done about it?
Fri, 26th Feb 2016
#
cybersecurity
#
cloud services
#
sap
SAP cyber threats soar, yet many firms underrate risks, reveals new Ponemon Institute survey, exposing a crucial corporate blind spot.
New ServiceNow cloud offerings designed to help security teams
Fri, 26th Feb 2016
#
cybersecurity
#
cloud services
#
servicenow
ServiceNow releases Security Operations, a platform to help IT teams respond to security incidents and vulnerabilities.