Advertisements


Hajime Malware Infects Tens of Thousands of IoT Devices

The malware's peer-to-peer IoT device network numbers in the tens of thousands, according to Symantec......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

How Docker Swarm Uses Transparent Root Rotation to Improve Security

Docker's swarmkit integrates multiple secure mechanisms including one known as Transparent Root Rotation......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

64 Percent of Security Pros Can"t Stop a Mobile Data Breach

And 51 percent believe the risk of mobile data loss is equal to or greater than that for PCs, a recent survey found......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Check Point Unifies Security Management

Check Point Infinity consolidates network, mobile and cloud security into a single architecture......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Almost 40 Percent of Industrial Computers Were Hit by Cyber Attacks in 2H 2016

And a quarter of all targeted attacks were aimed at industrial targets, a recent study found......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Lacework Emerges from Stealth with Polygraph Cloud Security

Lacework's "zero-touch" cloud workload security platform eliminates the need to fine-tune policies and pore over logs to secure cloud environments......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Securing Docker, One Patch at a Time

The open-source Docker container project integrates many different security approaches, but like every other software project, it still has to deal with reported software vulnerabilities......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Russian Hacker Sentenced to 27 Years in U.S. Prison

Roman Seleznev, the son of a Russian MP, caused over $169 million in damages by installing malware on point-of-sale machines......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Penetration Testing: DIY or Hire a Pen Tester?

Penetration testing is a simulated attack to find network vulnerabilities. Our guide offers everything you need to know about DIY and third-party pen testing......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Twistlock Raises $17M for Container Security

The application container security startup plans to expand into more markets and grow its product......»»

Source:  EsecurityplanetCategory: SecurityApr 26th, 2017Related News

Cisco switch taps into Time Sensitive Ethernet; software bolsters industrial network mgmt.

Cisco this week took the wraps off three products aimed at increasing the speed of communications while controlling and analyzing the substantial data stream of the factory floor.The products build on Cisco’s Connected Factory portfolio which of.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

Security certificates gone wrong

Security certificates are designed to authenticate hosts. Browsers have become pretty good about understanding chains of authorities, and making users accept the risk when websites can’t prove the chain of authorities needed to verify they are w.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

Security certificates gone wrong

Security certificates are designed to authenticate hosts. Browsers have become pretty good about understanding chains of authorities, and making users accept the risk when websites can’t prove the chain of authorities needed to verify they are w.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

Will the F-35 Be the Next Thunderbirds Jet?

TYNDALL AIR FORCE BASE, Florida — The F-16 Fighting Falcon has been the mainstay of the Air Force Thunderbirds for decades. But those who have... TYNDALL AIR FORCE BASE, Florida — The F-16 Fighting Falcon has been the mainstay of the.....»»

Source:  DefensetechCategory: SecurityApr 25th, 2017Related News

Will the F-35 Be the Next Thunderbirds Jet? Never Say Never

TYNDALL AIR FORCE BASE, Florida — The F-16 Fighting Falcon has been the mainstay of the Air Force Thunderbirds for decades. But those who have... TYNDALL AIR FORCE BASE, Florida — The F-16 Fighting Falcon has been the mainstay of the.....»»

Source:  DefensetechCategory: SecurityApr 25th, 2017Related News

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage continues to be an issue. For example, ESG research indicates that 45% of organizations report a “problematic shortage” of cybersecurity skills today, more than any other area within IT.Want more? Here.....»»

Source:  NetworkworldCategory: SecurityApr 25th, 2017Related News

Cybersecurity skills shortage impact on technology innovation

The global cybersecurity skills shortage continues to be an issue. For example, ESG research indicates that 45% of organizations report a “problematic shortage” of cybersecurity skills today, more than any other area within IT.Want more? Here.....»»

Source:  NetworkworldCategory: SecurityApr 25th, 2017Related News

Respond to ransomware in three steps: secure, assess, recover

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Your help desk email and phones start lighting up. Your CIO is in your offi.....»»

Source:  NetworkworldCategory: SecurityApr 25th, 2017Related News

Cybersecurity Skills Shortage Impact on Technology Innovation

I continue to research and write about the ongoing global cybersecurity skills shortage.  For example, ESG research indicates that 45% of organizations report a “problematic shortage” of cybersecurity skills today, more than any other area wi.....»»

Source:  NetworkworldCategory: SecurityApr 25th, 2017Related News

Respond to ransomware in three steps: secure, assess, recover

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Your help desk email and phones start lighting up. Your CIO is in your offi.....»»

Source:  NetworkworldCategory: SecurityApr 25th, 2017Related News