A former Akamai executive leads the effort that could help detect DDoS attacks and improve overall network visibility.
NEWS ANALYSIS: Social engineering is a major factor in the success of a sophisticated new fraud that's already resulted in the theft of millions from U.S. corporations.
Almost 30 percent of those polled are not confident that their IT security staff can detect a cyber-attack attempting to breach their network.
The FIDO Alliance adds Bluetooth and near-field communications to security specifications first defined in December 2014.
Apple tackles a long list of vulnerabilities in its desktop and mobile operating systems in advance of new version releases set to debut later this year.
The stealthy cyber-attack that resulted in the theft of millions of employee records reveals just how much the U.S. government must do to improve data security.
The acquisition will add to Cisco's Security Everywhere initiative, designed to bring security throughout the entire network.
A new $39 million round of funding, which comes at a critical time for security certificate use in organizations of all sizes, brings Venafi's total financing to $101 million.
The U.S. Office of Personnel Management is still reeling after publicly acknowledging earlier this month that it was breached in an attack that may have exposed personal information on 18 million Americans.
NEWS ANALYSIS: Government regulators quietly gathered aircraft makers and airline executives to start working on ways to keep hackers from compromising flight management systems.
CipherCloud and the Cloud Security Alliance form a new working group to fill a perceived gap in the cloud access security broker market.
The 2015 business environment requires enterprises to build and sustain an online presence for its customers, potential customers and partners. However, as each new Website, service or blog comes online, there opens a new potential attack surface for criminals. When cyber-thieves focus on your company—and it's sure to happen at some point—what will they learn through your online presence? To be able to look at itself from the outside in, like a skilled adversary, an enterprise should build and maintain a thorough cyber-exposure profile. A well-designed profile provides the visibility needed to help organizations prioritize their most serious issues, remediate problematic infrastructure and protect their reputations. Development of this profile is important because it identifies an organization's critical-resource exposure and potential attack vectors; it also prioritizes the level of risk associated with each. This eWEEK slide show discusses how to create a cyber-exposure profile and anticipate risks before they become huge problems.
It took about 2.5 hours to test, deploy and upgrade Ikea's entire IT infrastructure to defend against Shellshock. Here's how Ikea did it so quickly.
ESET brings much-needed simplicity to the management of security on network endpoints throughout an enterprise. The company's ERA (ESET Remote Administrator) version 6 brings innovations that should be welcome to administrators struggling with enforcing endpoint security policy on large, distributed networks, especially for companies with remote and mobile workers. What's more, ESET has re-engineered ERA v6 so that it can be deployed as a virtual appliance, simplifying adoption and bringing managed endpoint security to cloud-based environments. The virtual appliance option is offered as an OVA file, so it can be quickly imported into virtualization platforms from Microsoft (HyperV), Oracle (VirtualBox) and VMware (vSphere, Player, Workstation and ESXi). Additionally, a new browser-based console gives administrators full management access from anywhere they have connectivity. Aimed at large and midsize enterprises, ERA v6 includes customizable reports, active notifications, real-time monitoring, a fully instrumented dashboard and the ability to detect new endpoints and automatically push agents down to those endpoints. ERA v6 works with Linux, Macs and Windows endpoints and supports Android and IOS devices.
With documents showing national intelligence agencies are targeting Kaspersky and other security firms, can their customers really feel secure?