NEWS ANALYSIS: Recent incidents underscore the fact that despite budget shortfalls, states need to find a way to make elections as secure as possible.
The internet of things may be loaded with promise, but it's the potential hazards that are keeping many businesses from making the leap.
VIDEO: Mike Fey, president and COO of Symantec, discusses how the security giant will differentiate against competitors and help secure users.
The 2016 Summer Olympics in Rio de Janeiro caught the collective attention of the world, which watched as best-in-class athletes from countries from around the world competed for the coveted medals and honor for their countries. For those competing, the road to this year's Summer Olympics was paved with trial and error, grueling training processes and a desire to be the best. In the enterprise space, companies are competing in their own "Business Olympics" daily as they look to stand apart in their respective space and beat out the competition. One critical element of success for every organization is security and ensuring its employees, customers and partners that its sensitive and that proprietary information is safe and secure. So developers, listen up! It's never too early to start training if you're going for the gold in security in 2020. Based on conversations with executives at Checkmarx, this eWEEK slide show offers 10 training tips that you'll want to keep in your back pocket.
Once attack tools are leaked, they are adopted rapidly by many attackers. Will the leaked NSA exploits quickly be used in an attack, and what is being done?
Security startup IDVector builds ephemeral connections though cloud providers to help provide security and some anonymity for users.
One look at breaches reported by financial firms finds that lost devices have been the most common reason for a breach, while another finds that hacking has become the leading threat in the past three years.
An attack against a human rights advocate ends up exposing actions of the NSO Group and a new mobile attack.
VIDEO: Nicko van Someren, CTO of the Linux Foundation, discusses how the CII is moving forward to make open-source software more secure.
The number of ransomware variants has escalated so far this year, Trend Micro's latest security report finds, but little data exists on how many victims have been hit.
Often, new technologies raise security concerns. However, two reports claim it's safer to run applications inside containers than outside of them.
Over the last two-plus weeks, the 2016 Summer Olympics in Rio de Janeiro highlighted unbelievable athletic performances, the spirit of competition and cyber-security vulnerabilities, as waves of cyber-attacks hit organizations at both the city and state level, along with other government and Olympic websites. Throughout the games, there were reports that the Anonymous hacking group had been trying to disrupt the Olympics to call attention to humanitarian and political issues in Brazil using distributed denial-of-service (DDoS) attacks and data dumps, while actively targeting more personal, financial and log-in information. The attacks made the Olympics yet another wake-up call for organizations still vulnerable to common attack vectors. In these situations, it's often the underprepared who become targets and feel the full brunt of the attacks although every organization associated with the Olympics was a potential target when the goal was publicity. Now that the games are over, eWEEK spoke with the team at Radware and came up with eight actionable tips to make sure your company, even if it's targeted, can withstand these kinds of attacks, whether they're directed at you or you're simply caught in the cross hairs.
For a long time, encryption was like drinking prune juice or taking castor oil for employees in an enterprise—they only used it when they absolutely had to. Not so anymore. Encryption for data storage and email security is now almost mainstream within enterprises, largely because: a) internal and cyber-security issues are at an all-time high and b) security companies have been working hard to make encryption and key management easier to use. Still, encryption has suffered in the past from persistent myths about how it can be used and deployed, such as worries about losing control of encryption keys, slowing down hardware performance as well as potential complexity of deployment. These myths and false perceptions do not reflect the capabilities of encryption offerings in 2016. This eWEEK slide show, based on the longtime industry experience of Eric Chiu, co-founder and president at HyTrust, provides guidance on the reality of using encryption to secure critical data across the business.
There is currently a lot of buzz about network and data-centric security but not nearly as much about the app-centric brand.