Security News & Reviews - Page 4

More Security News

Confusing Meltdown, Spectre Patch Array

Top Five Ways Security Vulnerabilities Hide in Your IT Systems

Corporate IT systems with known vulnerabilities are often missed or overlooked. In the case of Equifax, a known vulnerability led to hundreds of millions of dollars in losses. Here are the top-5 ways that vulnerabilities hide inside your company.
Cloud Security Concern

Google Introduces SSL Policy Setting Capability For Load Balancers

Organizations using Google' cloud now have greater control over how its HTTPS and SSL Proxy load balancers connect with client systems.
February eWEEK Recap Video

Social Networks Purge Bots Spreading Fake Posts on Florida Killings VIDEO

Russian operatives used phony social media accounts, bots and automated postings to spread disinformation about the mass shooting at a Florida high school killing 17 students and staff.
DDoS Amplification 2

Attackers Using Memcached Servers to Amplify DDoS Attacks

Multiple vendors are warning about the rise of a new type of DDoS attack that uses internet accessible memcached services to amplify the volume of attack traffic.

8 Startups Raise Money to Secure Everything From ICS to Home Networks SLIDESHOW

Cyber-security startups continue to attract the interest of venture capitalists, with industrial control system and threat hunting vendors among those that secured new funding in February.
Two Factor Authentication Ignorance.

Duo Security Discloses SAML Single Sign On Vulnerabilities

Widely used single sign on protocol could potentially be mis-configured, enabling attackers to easily take over a victim's account.
Daily Tech Briefing Feb. 27, 2018

Cyber-Threat Volume Is Increasing, Security Reports Reveal VIDEO

DAILY VIDEO: Cyber-security reports reveal growing concerns about data breach risks; Google says new cloud updates simplify VM management; DataTorrent fortifies its streaming-data management toolset; and there's more.
Protecking Networks from North Koreans

CrowdStrike Reveals Time to Breakout as Key Cyber-Security Metric

Breaches don't actually happen at the speed of light: Security firm CrowdStrike has determined that the average time to breakout is less than two hours.

Encryption Use Growing for Both Data Traffic and Malware, Cisco Finds SLIDESHOW

Cisco's 2017 Annual Cybersecurity Report reveals some interesting trends, including malware authors' growing use of encryption and the challenge organizations face from using multiple security vendors.

Phishing Security Firm PhishMe Rebrands as Cofense After Acquisition

Phishing security vendor Cofense aims to provide a collaborative defense, enabling humans to become a stronger link in helping to improve email security.
BEC Email Scam

How to Recognize and Thwart Business Email Compromise Scams

NEWS ANALYSIS: The effectiveness of the recent round of business email compromise attacks depends on poor email security and poor invoicing practices.

Why Blockchain Will Serve New IT Purposes in 2018

NEWS ANALYSIS: The use of blockchain’s digital ledger is a growing trend because it offers a new level of security in business transactions that wasn’t available previously. With security at the top of everybody’s list for finding new solutions fast, this idea has caused a lot of interest in...

Enterprise Tech Videos