• October 28, 2015 28 Oct'15

    Disputed Cybersecurity Information Sharing Act passes Senate

    Despite vocal criticism from privacy advocates and technology companies, the U.S. Senate passed the Cybersecurity Information Sharing Act by an overwhelming majority.

  • October 26, 2015 26 Oct'15

    Dridex malware returns despite DOJ arrests

    The Dridex malware has made a return, and attackers are once again using botnets to send the Trojan to banks, despite the Department of Justice making high-profile arrests last month.

  • October 23, 2015 23 Oct'15

    Google to adopt strictest DMARC policy to fight spam, phishing

    News roundup: Google to implement strictest DMARC policy in anti-phishing campaign. Plus: CISA is coming, the health care industry is lagging and SHA-1 is failing.

  • October 22, 2015 22 Oct'15

    Experts say Oracle patches need to be faster

    Oracle patches 154 flaws in its quarterly update. Experts said patches need to be released faster, but Oracle stands by its release schedule.

  • October 21, 2015 21 Oct'15

    Trend Micro acquires HP TippingPoint for $300 million

    Trend Micro agreed to purchase HP TippingPoint for $300 million in an effort to bolster network security, but experts disagree on the strategy of either company involved.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • October 20, 2015 20 Oct'15

    Report: CIA director's email hacked repeatedly by high school student

    CIA Director John Brennan had his email hacked multiple times, and the hacker found that Brennan stored potentially sensitive information in his AOL email account.

  • October 20, 2015 20 Oct'15

    Social media attacks a growing concern for enterprises

    It's important for online users to understand social media risks and the caution they should use when sharing personal information online.

  • October 19, 2015 19 Oct'15

    Adobe patches Flash zero-day used in foreign ministry attacks

    Adobe has released an emergency patch for Flash zero-day vulnerabilities that have been exploited in the wild in attacks on foreign affairs ministries.

  • October 16, 2015 16 Oct'15

    EMV transition: FBI warns while Target opts for PINs

    News roundup: FBI issues a public service announcement about EMV chip-and-signature cards. Plus: bumper crop of OS X malware in 2015; phishing sites with authenticated certificates and more.

  • October 16, 2015 16 Oct'15

    Automating security, privacy in software programming

    Jean Yang, who created the Jeeves software language, explains why the industry needs to do a better job of enforcing security and privacy policies in its applications.

  • October 16, 2015 16 Oct'15

    What does the Consumer Privacy Bill of Rights mean for enterprises?

    The Consumer Privacy Bill of Rights, if made a federal law, would create a uniform set of privacy requirements. Here's a look at the potential benefits.

  • October 15, 2015 15 Oct'15

    Cybersecurity strategy needs to be more dynamic, experts say

    The digital world moves very fast, but a new survey claims that cybersecurity strategy does not move fast enough to keep up with threats -- and experts tend to agree.

  • October 14, 2015 14 Oct'15

    Windows 10 security fixes longtime OS vulnerabilities

    Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities.

  • October 13, 2015 13 Oct'15

    October Patch Tuesday: The first of 2015 with no zero-day exploits

    Microsoft's October 2015 Patch Tuesday has the fewest number of bulletins of any release this year, and is also the first of the year to not feature any patches related to zero-day exploits.

  • October 13, 2015 13 Oct'15

    Chinese hackers arrested at the request of the US

    China's government has reportedly arrested a number of Chinese hackers suspected of involvement with attacks on the US, but one expert is unsure this will lead to more cooperation between nations.