One year after launch, the company says the router's security features set it apart from the others.
Facebook teamed up with security firm Trail of Bits to port the popular open source osquery agent for Linux and Mac OS X systems to the Windows OS.
Google's new CSP Evaluator tool is designed to help developers make sure that policies they use for mitigating cross-site scripting errors are effective.
The new releases of Splunk's Enterprise Security and User Behavior Analytics platforms are aimed at providing improved operational intelligence.
Microsoft takes a leading investment role in the container security startup, which launched its Aqua Container Security platform in May.
NEWS ANALYSIS: Although a 665G-bps attack is considered an outlier today, there will likely come a day when it is not looked at that way.
NEWS ANALYSIS: Scientists have shown that some subatomic particles exhibit quantum entanglement, which potentially enables unhackable communications that may be able to travel faster than the speed of light.
While one annual industry report puts the cost of the average cyber-incident at $1 million, an analysis of insurance data puts damages much lower—at about $200,000.
The companies are partnering to bring FIDO-compliant fingerprint authentication to upcoming Lenovo laptops, starting with the Yogi 910 convertible PC.
NEWS ANALYSIS: A Yahoo investigation couldn't confirm the breach of 200 million accounts that was first alleged by hacker "Peace" in the summer, but it actually found an entirely new one by state-sponsored hackers.
Shadow IT, the common practice of employees, partners and contractors using applications outside the purview of an enterprise IT system, is both a promoter of speedy work and a huge security liability. As businesses adopt more cloud apps to better perform critical tasks, they are also discovering the need to protect themselves against constant threats to their sensitive and regulated data. Enterprises have been quick to recognize the threat posed by shadow IT, but this is only half of the security story. What's not commonly understood is the threat posed by shadow data, the data created by the use of shadow IT. This eWEEK slide show uses industry information and research from IDC Research, Gartner Research and the Blue Coat Elastica Cloud Threat Labs (BCECTL) Shadow Data Report to provide an in-depth look at the shadow data threat. It identifies the risks associated with over-exposed data in the cloud, explores business readiness applications for the enterprise, identifies GDPR regulations, and provides steps on how to secure enterprise data in the cloud.
Agency official Robert Silvers urges the industry to develop long-term solutions while also taking actions to address short-term challenges.
The latest Yahoo breach could be one of the largest of all time. More than 500 million user accounts were affected.
NEWS ANALYSIS: The biggest single problem for security of the Internet of Things is that for the most part there isn't any and most of the things that need securing can't be readily updated to include it.
A survey of breach data finds that 97 percent of Global 1000 companies have had employees impacted by the loss of their credentials, according to research by security firm Digital Shadows.