A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.
Malware and Vulnerabilities - News, Features, and Slideshows
A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.
Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.
Microsoft is quietly recommending that customers uninstall one of last week's security updates after users reported that it crippled their computers with the infamous "Blue Screen of Death."
A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.
Two months after Microsoft ended support for Windows XP, the catastrophic wave of exploits security experts expected to wash over the aged operating system have failed to materialize.
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
Whitepapers about Malware and Vulnerabilities
Cyberattacks have evolved to become much more complex, however the core techniques employed by malware are usually recycled and largely unchanged. <p> Find out how these targeted attacks affect companies in real world cases and why legacy solutions that focus on detection are insufficient to protect secure enterprise data. Included are also 10 preventative measures you can take to prevent a corporate security breach.
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register
- New Destination Gigamon Security Resources IS HERE
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- Caution: That SSL Blind Spot is Growing
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- The Future is Encrypted. Manage It.
- Test Your Knowledge of Network Encryption
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Ransomware explosion is the latest security wakeup call for CxOs
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- See Your Traffic for What It Really Is