When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.
Stories by Maria Korolov
Cyber criminals don't need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.
End-to-end email encryption is getting more attention as security and compliance concerns mount, but practical use cases are rapidly being eaten away by other technologies.
Ransomware attacks--and defenses against them--are evolving fast, but enterprises still struggle to keep up.
Ransomware and other threats often get through signature-based anti-virus protection, giving it a bad rap. However, anti-virus tools still play an important role in the enterprise security strategy.
In this age of destructive and fast-spreading malware, companies are giving whitelisting a second look -- and with cloud-based, peer-to-peer whitelists and reputation scoring, the technology now has a chance to be widely adopted.
When the WannaCry malware hit, many users were scrambling for fixes -- but some of the proffered solutions were actually just more malware, in disguise
The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when appropriate.
Vulnerabilities with catchy nicknames get more attention from media, customers, and vendors and so get patched more thoroughly than similar vulnerabilities without clever names.
The rapid growth of the mobile sector has had an unexpected dividend by bringing down the costs and improving the quality of motion sensors, screens, and processors it has helped usher in a new era of virtual reality technology.
Open source software, once just the domain of technology hobbyists, is taking over the software world
The latest release of Fedora, nicknamed "Heisenbug," is a step towards making Fedora a player in the mobile arena. Fedora 20 also includes more support for cloud, and this is also the first release that supports cheap, low-power ARM processors as a primary architecture, in addition to Intel and AMD chips.
Protecting yourself against phishing attacks used to be relatively easy. Don't download unexpected attachments. Visit banking websites directly instead of clicking on links in an email. And look for bad grammar.
The newest release of Ubuntu, dubbed Saucy Salamander, doesn't offer much in the way of new features – except for the introduction of Ubuntu Touch for mobile platforms.
Here are 10 types of links you should never click on.
- Network Engineer ACT
- Senior Salesforce Functional Consultant NSW
- Service management Business Analyst NSW
- Business Analyst / Advisor - Content & Collaboration - SharePoint NSW
- Business Analyst QLD
- Technical Services Administrator VIC
- Adlib Developer VIC
- Tech PM - Security NSW
- Business Intelligence Specialist NSW
- Project Implementation Support - Telecom Industry VIC
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.