New tools will make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.
Maria Korolov |
11 Apr |
Read more
Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.
Maria Korolov |
12 Feb |
Read more
Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.
Maria Korolov |
29 Oct |
Read more
Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.
Maria Korolov |
11 Oct |
Read more
Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.
Maria Korolov |
09 Oct |
Read more
Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.
Maria Korolov |
27 Aug |
Read more
California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Maria Korolov |
30 Jul |
Read more
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Maria Korolov |
10 Apr |
Read more
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.
Maria Korolov |
04 Apr |
Read more
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.
Maria Korolov |
05 Mar |
Read more
From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.
Maria Korolov |
22 Feb |
Read more
Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.
Maria Korolov |
01 Feb |
Read more
Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.
Maria Korolov |
04 Jan |
Read more
Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
Maria Korolov |
06 Dec |
Read more
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
Maria Korolov |
14 Nov |
Read more