December 11, 2018
Via: Help Net SecurityThe Cybersecurity M&A Market Report from international technology mergers and acquisitions advisors, Hampleton Partners, outlines how high profile hacks, the global digitization of business and new regulations are driving record transaction volumes and valuations, with 141 completed transactions by October […]
May 3, 2018
Via: CIOFear not shadow IT, the software and services employees secretly use without explicit organizational approval. For decades, CIOs and IT managers have searched for ways of reliably ferreting out and squashing shadow technologies, realizing that the illicit tools create dangerous […]
April 18, 2016
Via: CSO OnlineThe Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products. In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS […]
May 27, 2015
Via: cloud-securityBacked by leading IT security researchers, companies and organizations, including IOActive, Kaspersky Lab, Bastille, and the #cloud Security Alliance, the global Securing Smart Cities initiative aims to solve the cybersecurity challenges smart cities face through collaboration and information sharing. The […]
May 25, 2015
Via: cyber-crimeWhether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your security best practices are coming along for the ride. Cybercriminals don’t […]
May 24, 2015
Via: vulnerabilitiesEmail security vendor Sendio has patched a pair of remotely exploitable security bypass vulnerabilities in its Sendio ESP, or Email Security Platform, product. Researchers at Core Security Technologies reported the vulnerabilities March 26 to Sendio, along with a proof of […]
May 20, 2015
Via: network-securityAkamai #technologies analyzed thousands of #ddos attacks as well as nearly millions of #web application #attack triggers across the Akamai Edge #network. Q1 2015 set a record for the number of DDoS attacks – more than double the number recorded […]
May 15, 2015
Via: hacker#microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to #security vendor FireEye. The group, which FireEye calls APT (advanced persistent threat) 17, is well-known for attacks […]
March 21, 2024
March 7, 2024