Security threats News
September 06, 2017
Windows 10 micro-virtualization aims to protect against emerging threats. Microsoft's partner in this initiative, Bromium, says Windows remains IT's biggest security challenge.
August 16, 2017
Talk about protecting customer data and intrusion protection is common. Stealing source code is harder to acknowledge, but equally important to keeping a business in business.
August 04, 2017
Integrator WWT is partnering with anti-drone technology vendor Dedrone to expand its physical and cybersecurity services into airspace security; other news from the week.
July 27, 2017
Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats.
Security threats Get Started
Bring yourself up to speed with our introductory content
Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems. Continue Reading
A threat hunter, also called a cybersecurity threat analyst, is a security professional or security professional service provider that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems. Continue Reading
With digital transformations underway in many industries, CIOs aren't the only ones who need to have the next big thing on their radar. What security innovations should you follow to ready your organization's information security programs?
The internet of things is both a security threat and potentially a security boon. Big data, machine learning and a growing number of systems with pseudo artificial intelligence may help ease the workloads of security analysts. Bitcoin's distributed database technology known as blockchain can add security to a variety of systems, but scalability remains an early concern. Quantum computing? That one may be too far out -- five years at least -- to be considered a near-term technology disruptor to enterprise information security programs.
Whether your organization is focused on manufacturing and infrastructure -- such as industrial control systems -- or consumer and information technology -- such as the internet of things -- everything is rapidly becoming connected and potentially accessible from the internet. Many information security programs are not on track for the internet of things, complex clouds and other technology disruptors. We dust off the crystal ball in this issue of Information Security magazine and ask infosec experts and venture capitalists to look into the future.Continue Reading
Evaluate Security threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This Q&A takes an in-depth look at the Oracle container plans, including its work with Docker, Kubernetes and the open source container community. Continue Reading
Christopher Budd of Palo Alto Networks takes a look at the IoT-based Amnesia botnet, or as he calls it, "a Mirai that wasn't." Continue Reading
Enterprises aren't truly prepared for cyber threats unless they have proper security incident management in place. Expert Peter Sullivan explains what enterprises need to know. Continue Reading
Manage Security threats
Learn to apply best practices and optimize your operations.
The current threat landscape makes cybersecurity breaches seem unavoidable. Expert Peter Sullivan discusses some simple ways enterprises can reduce the risk of a breach. Continue Reading
Cloud-based collaboration software offers productivity benefits, but carries security risks. Learn about three collaboration security threats facing organizations and how to address them. Continue Reading
An anti-DDoS program requires solid understanding of the threat and a clearly thought-out strategy. This guide will help you define and implement a solid DDoS defense plan. Continue Reading
Problem Solve Security threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Certain Windows 10 security features can be bypassed with code-reuse attacks. Expert Michael Cobb explains how that works and what can be done to prevent it. Continue Reading
Should products intercept Transport Layer Security connections to gain visibility into network traffic? A new study by researchers and U.S.-CERT warn against it. Continue Reading
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend such attacks. Continue Reading