Security News & Reviews - Page 7

More Security News

 IBM Black Hat Deeplocker

IBM Demonstrates DeepLocker AI Malware at Black Hat

IBM researchers have developed a new proof of concept malware that can be highly targeted and very difficult to detect.
cloud security

Google Releases Details on New Shielded VMs Cloud Security Tools

The goal of the Shielded VMs technology is to help enterprises protect their workloads from hardware and firmware level cyber-threats, Google executives say.
Jask Chiron Black Hat

Jask's Chiron Brings AI Threat Detection to Home Networks

At Black Hat USA 2018, security researchers from Jask are set to demonstrate an all-in-one virtual machine for machine learning powered threat detection

Confluent Streaming Data: Product Overview and Analysis

By using a fully-managed Confluent streaming data service on Google Cloud, users can offload the operating burden of Apache Kafka and stream data at scale in real time to Google Cloud’s big data services, which including BigQuery, Cloud Machine Learning Engine and TensorFlow.
Daily Tech Briefing Aug. 7, 2018

Tech Support Scammers Taking Advantage of Call Optimization Services VIDEO

DAILY VIDEO: Symantec warns of increasingly sophisticated tech support scams, and Google is warning enterprises of potential attacks on G Suite accounts.
IOActive Trading Apps Black Hat 1088x725

IOActive to Detail Stock Trading App Vulnerabilities at Black Hat

IOActive looked at both desktop and mobile stock trading applications and found security to be lacking.

How to Secure an IoT System in a Mere Few Minutes

By 2020, IoT devices are expected to grow to 31 billion in use globally, and by 2025, the number will surpass 75.4 billion devices. That’s a lot of potential attack surfaces. Everything has to be protected.

Okta Identity Management: Product Overview and Analysis

Okta enables organizations to both secure and manage their extended enterprise and transform their customers’ experiences.
DFLabs Black Hat

DFLabs to Release Free Live Forensics Tool at Black Hat

At Black Hat USA, DFLabs will demonstrate a new free tool to help incident responders collect live forensic data.
IBM X-Force Red Austin

IBM X-Force Red Grows With New Labs and ATM Testing Service

IBM's X-Force Red penetration testing service is expanding with new labs and a service that will test the security of banking machines.
Implementing Two-Factor Authentication

Wrong Ways and Right Ways to Implement Two-Factor Authentication

NEWS ANALYSIS: Single-factor authentication, passwords for example, may be better than nothing, but they don’t really offer much security these days. Many organizations are implementing two-factor authentication, but they aren’t doing it right.
Google Play Malware

Google Removes 145 Malware-Laden Apps From Play Store

Security software company Palo Alto Networks discovered the malicious Android apps on the Play Store and reported them to Google.

Enterprise Tech Videos