Advertisement
Top

Tag: Solutions


Network security

Security budgets are rising, but is it enough?

October 22, 2018

Via: Help Net Security

A majority of companies (54 percent) are worried that they will soon outgrow their security solutions, according to Threat Stack. While budgets are expected to increase by 19 percent over the next two years, organizations are struggling with a disconnect […]


Network security

Global spending on security solutions to reach $133.7 billion in 2022

October 8, 2018

Via: Help Net Security

Worldwide spending on security-related hardware, software, and services is forecast to reach $133.7 billion in 2022, according to IDC. Although spending growth is expected to gradually slow over the 2017-2022 forecast period, the market will still deliver a compound annual […]


Network security

Regulation May Be Best Answer to IoT Insecurity

November 17, 2016

Via: Threat Post

One thing technologists overtly shun is the prospect of government regulation. But recent DDoS attacks carried out by botnets of connected things have spooked some people of influence in security to the point where intervention by lawmakers may be inevitable. […]


Editorial, Network security

Adaptive security, the smart way to protect systems

November 16, 2016

Via: Russel Edwards

MarketsandMarkets, as quoted by Help Net Security, recently reported that the adaptive security market will gain considerable traction in the next five years. This success comes from the need to defend networks and IT systems against advanced threats. The expected […]


Vulnerabilities

Security fatigue is real – we need usable security

October 7, 2016

Via: Help Net Security

A preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security fatigue is a real thing. Security fatigue – weariness from dealing with […]


Malware, Virus & Malware

To stop ransomware, opt for app graylisting and admin rights removal

August 4, 2016

Via: Help Net Security

CyberArk Labs tested over 23,000 ransomware samples from more than 30 prevalent malware families, including Cryptolocker, Petya and Locky, in order to better understand common infection, encryption and removal characteristics, and identify potential strategies for mitigating the impact of ransomware […]


Malware

There’s finally reason to hope in the war against ransomware

May 24, 2016

Via: CIO

Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do. These options include both hardware and software […]


Vulnerabilities

Serious Vulnerabilities Found in Moxa Industrial Secure Routers

May 20, 2016

Via: Security Week

Industrial networking, computing and automation solutions provider Moxa has released a firmware update for one of its industrial secure routers to address several high severity vulnerabilities that can be exploited for denial-of-service (DoS) attacks, privilege escalation, and arbitrary code execution. […]


Cloud security

Innovative New Solutions for Securing the Internet of Things

February 23, 2016

Via: Security Intelligence

The Internet of Things (IoT), commonplace devices connected to each other to become more than the sum of their parts, is quickly becoming an exciting reality. However, there are connectivity, interoperability, management, scalability, privacy and security challenges that require a […]


Mobile security, Security

Simplifying Enterprise Mobile Security at InterConnect 2016

February 22, 2016

Via: Security Intelligence

Engaging with any IT vendor around mobile security will invariably lead to the conclusion that there are many tools available. It’s at this time that some simple qualification can determine whether the vendor has a solution that addresses your enterprise […]


Access control

Good-bye weak passwords, hello GOTPass graphical authentication

February 5, 2016

Via: Tech Republic

“Humans suck at choosing passwords,” writes security pundit Graham Cluley. That is hard to argue according to SplashData (TeamsID), which reported on 2015’s worst passwords, with 123456 and password ranking as the most commonly used passwords. “In SplashData’s fifth annual […]


Privacy protection

What to do for privacy after Safe Harbor? Syncplicity has an idea

November 11, 2015

Via: CSO Online

Data privacy law is murky since Europe’s highest court struck down the Safe Harbor agreement long used between the U.S. and Europe. Some cloud storage vendors now plan to help enterprises adjust to the new reality. Last week, Amazon announced […]


Threats & Malware

MITRE Matrix: Going on the ATT&CK

August 19, 2015

Via: threats-and-malware

Most cybersecurity work is geared towards finding ways to prevent intrusions – passwords, two-factor authentication, firewalls, to name a few – and to identify the “chinks in the armor” that need to be sealed. The characteristics of malware are shared […]


Editorial, Privacy protection

Tokenization – security’s knight in shining armor?

August 19, 2015

Via: Russel Edwards

#tokenization translates as replacing sensitive data elements with their non-sensitive equivalents. The value of the resulting elements being non-exploitable, this #security procedure is supposed to reduce the risks. In order to retrace the steps back to the original sensitive data, […]