• April 01, 2016 01 Apr'16

    What endpoint protection software is on your short list?

    Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints.

  • March 31, 2016 31 Mar'16

    Ransomware vaccine promises protection, but experts are wary

    A new ransomware vaccine promises to protect against infections by popular ransomware variants like Locky and TeslaCrypt, but experts are wary about implementation and security.

  • March 31, 2016 31 Mar'16

    Badlock flaw hits Samba, Windows and responsible disclosure

    The serious Badlock vulnerability in Windows and Samba, announced three weeks prior to patches, triggers a debate over responsible disclosure of software flaws.

  • March 29, 2016 29 Mar'16

    Report: 1.5 million Verizon Enterprise customer records stolen

    Krebs on Security reports 1.5 million customer contact records were swiped from Verizon Enterprise Solutions and offered for sale on Dark Web; customers are at risk for phishing attacks.

  • March 29, 2016 29 Mar'16

    DOJ finds successful iPhone crack; drops backdoor bid, for now

    The DOJ found a successful iPhone crack to access the San Bernardino, Calif., terrorist's device and dropped the pending legal action against Apple, but only in that one case.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • March 25, 2016 25 Mar'16

    Congress considers 'going dark' encryption legislation

    Roundup: Sens. Dianne Feinstein and Richard Burr seek support for an encryption legislation draft, as U.S. politicians consider their options to address the 'going dark' problem.

  • March 25, 2016 25 Mar'16

    Outbreak of ransomware attacks hit hospitals, enterprises

    A series of ransomware attacks have been reported at hospitals in the U.S. and Canada, leading to experts recommending automated backup for enterprises.

  • March 24, 2016 24 Mar'16

    FBI iPhone backdoor case on hold, as potential hack surfaces

    The FBI iPhone backdoor case was put on hold temporarily, as reports surfaced of a possible hack that would allow FBI access without the help of Apple.

  • March 21, 2016 21 Mar'16

    Stagefright exploit created with reliable ASLR bypass

    Researchers have developed a Stagefright exploit, which could mean hundreds of millions of Android devices are at risk, despite mitigations and an available patch.

  • March 18, 2016 18 Mar'16

    Apple court filing challenges iPhone backdoor as rhetoric heats up

    The rhetoric about the iPhone backdoor from Apple and the FBI has gotten more intense as Apple challenged the FBI in court by calling its motion unconstitutional.

  • March 18, 2016 18 Mar'16

    Google boosts HTTPS, Certificate Transparency to encrypt Web

    Roundup: Google pushes efforts on HTTPS, Certificate Transparency and more to safeguard the Web with encryption, while other tech firms are eyeing more, stronger encryption.

  • March 18, 2016 18 Mar'16

    Automated penetration testing prototype uses machine learning

    A team created a prototype machine learning vulnerability scanner that can think like a human in order to perform automated penetration testing.

  • March 16, 2016 16 Mar'16

    Phishing campaign takes ransomware attacks to a global scale

    Research has uncovered ransomware attacks that begin with a sophisticated phishing campaign hitting users around the globe.

  • March 16, 2016 16 Mar'16

    Java vulnerability report strains responsible disclosure

    A security researcher reports Oracle's 30-month-old failed patch for a Java vulnerability, and experts suggest it was an irresponsible disclosure, despite frustration with Oracle's patching process.

  • March 11, 2016 11 Mar'16

    DROWN attack: TLS under fire again

    News roundup: DROWN attack affects millions of servers with an SSLv2 vulnerability; the Home Depot breach lawsuit settlement is pending; and Chinese smartphone-maker ZTE is sanctioned.