Security News & Reviews - Page 7

More Security News

 IBM Black Hat Deeplocker

IBM Demonstrates DeepLocker AI Malware at Black Hat

|
IBM researchers have developed a new proof of concept malware that can be highly targeted and very difficult to detect.
cloud security

Google Releases Details on New Shielded VMs Cloud Security Tools

|
The goal of the Shielded VMs technology is to help enterprises protect their workloads from hardware and firmware level cyber-threats, Google executives say.
Jask Chiron Black Hat

Jask's Chiron Brings AI Threat Detection to Home Networks

|
At Black Hat USA 2018, security researchers from Jask are set to demonstrate an all-in-one virtual machine for machine learning powered threat detection
Confluent_PO

Confluent Streaming Data: Product Overview and Analysis

|
By using a fully-managed Confluent streaming data service on Google Cloud, users can offload the operating burden of Apache Kafka and stream data at scale in real time to Google Cloud’s big data services, which including BigQuery, Cloud Machine Learning Engine and TensorFlow.
Daily Tech Briefing Aug. 7, 2018

Tech Support Scammers Taking Advantage of Call Optimization Services VIDEO

|
DAILY VIDEO: Symantec warns of increasingly sophisticated tech support scams, and Google is warning enterprises of potential attacks on G Suite accounts.
IOActive Trading Apps Black Hat 1088x725

IOActive to Detail Stock Trading App Vulnerabilities at Black Hat

|
IOActive looked at both desktop and mobile stock trading applications and found security to be lacking.
IoT.items

How to Secure an IoT System in a Mere Few Minutes

|
By 2020, IoT devices are expected to grow to 31 billion in use globally, and by 2025, the number will surpass 75.4 billion devices. That’s a lot of potential attack surfaces. Everything has to be protected.
Okta_PO

Okta Identity Management: Product Overview and Analysis

|
Okta enables organizations to both secure and manage their extended enterprise and transform their customers’ experiences.
DFLabs Black Hat

DFLabs to Release Free Live Forensics Tool at Black Hat

|
At Black Hat USA, DFLabs will demonstrate a new free tool to help incident responders collect live forensic data.
IBM X-Force Red Austin

IBM X-Force Red Grows With New Labs and ATM Testing Service

|
IBM's X-Force Red penetration testing service is expanding with new labs and a service that will test the security of banking machines.
Implementing Two-Factor Authentication

Wrong Ways and Right Ways to Implement Two-Factor Authentication

|
NEWS ANALYSIS: Single-factor authentication, passwords for example, may be better than nothing, but they don’t really offer much security these days. Many organizations are implementing two-factor authentication, but they aren’t doing it right.
Google Play Malware

Google Removes 145 Malware-Laden Apps From Play Store

|
Security software company Palo Alto Networks discovered the malicious Android apps on the Play Store and reported them to Google.

Enterprise Tech Videos