The company’s data-centric platform protects sensitive data residing on or traveling to and from mobile devices within and outside of the firewall.
Enterprises are making security improvements, but without integrated threat defenses, the hackers are still two jumps ahead.
One report alleges that United Airlines was recently breached by hackers who are also tied to the U.S. Office of Personnel Management and Anthem breaches.
Pindrop's new Fraud Workbench capabilities enable organizations to take deeper looks at incidents.
Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says.
In an analysis, security firm Tripwire found that three popular hubs have a number of vulnerabilities that could allow attacker mischief.
NEWS ANALYSIS: The U.S. Census Bureau is the latest government agency to fall victim to a hack, this is one caused by an IT misconfiguration.
East-west (machine-to-machine) data movement is increasing in volume as workloads become movable and thus more demanding on their infrastructures. At the same time, perimeter-only, firewall-based security has proved weak in a world of advanced cyber-attacks. Evolving security models, such as software-defined and distributed firewalls, are beneficial, but they also create new management complexities. In these environments, IT teams are finding it difficult to deploy a tight approach to security. To improve security profiles, organizations are now turning to techniques such as micro-segmentation to amplify and distribute current defenses. Micro-segmentation divides a network into smaller zones and provides protection by making security adaptive and multilayered. It provisions services closer to the applications, between application tiers and even to the machines within tiers. In this slide show, citing resources from eWEEK archives, a whitepaper from VMware and industry perspective from Arkin's Mahesh Kumar, we examine the top 10 reasons why micro-segmentation can provide greater security than conventional approaches within the data center.
Total funding now tops $77 million as Cylance aims to answer the question of how to protect organizations against attacks.
Gone in 60 seconds. Security researchers will demonstrate at an Aug. 8 DefCon presentation how they can crack a modern Brink's safe in just a minute.
With days before Windows 10's official release, Microsoft details some of the many security features aimed at keeping users and their data safe.
A vulnerability in the Stagefright media library used in Android remains unpatched in 95 percent of devices months after first being reported by Zimperium.
A group of customers, analysts and journalists at a Dell roundtable say the responsibility for driving data security ultimately falls on the vendors.
NEWS ANALYSIS: The recall of 1.4 million Fiat Chrysler vehicles to update software to prevent a difficult-to-execute hack of onboard control systems highlights the rising fears about Internet of things security.
The FIDO standard-compliant implementation could enable broader use of biometric devices for strong authentication.