News Analyses

nup 177120 0001
eye binary IDS Intrusion Detection System

cloud security lock

Palo Alto Networks extends security to the big 3 public clouds

Palo Alto Networks Next-Generation Security Platform expands security to all major public cloud services: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

mergers

Apple, Cisco, Aon and Allianz partner in cyber risk management

Cyber risk is real but hard to protect against. To help organizations, Apple, Cisco, Aon, and Allianz have partnered to create a joint solution.

drowning in red tape bureaucracy ai machine learning

What does the GDPR and the "right to explanation" mean for AI?

Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?

patching against ransomware

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

network security primary2

The Qubes high-security operating system gains traction in the enterprise

Qubes OS defends at-risk enterprise users from targeted attacks, as well as drive-by malware and the Meltdown exploit.

pile of credit cards financial tech

Using better data to fight credit card fraud

Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology.

17 open source table laptop group

Are the BSDs dying? Some security researchers think so

To few eyeballs on code is a security issue. Can FreeBSD, OpenBSD, and NetBSD survive?

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

security training ts

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

checklist project

Rating software security Consumer Reports-style

The Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.

financial tech

List of 200 cybersecurity startups that received venture capital in 2017

VC firms and corporate investors are fueling a trillion-dollar cybersecurity market.

datacenter servers warehouse database

Contractor hacks former employer, destroys and corrupts data

Edward Soybel was let go by W. W. Grainger and subsequently hacked his way back into the company to access customer databases to destroy and corrupt the data.

hacked computer security symbol   hacked rot

6 reasons you’re failing to focus on your biggest IT security threats

Most companies are not focused on the real security threats they face, leaving them ever more vulnerable. That can change if they trust their data rather than the hype.

data security encryption

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

Broken window with band-aid patch

Meltdown and Spectre patches: Where to start and what to expect

You need to apply Meltdown and Spectre patches to pretty much everything in your enterprise. And you need to start now. We help you prioritize.

Big data analytics hand touchscreen user man

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.

meltdown spectre

Meltdown and Spectre affect the smartphone in your pocket. Should you be worried?

Android and iOS devices are vulnerable to the latest hardware security flaw, and not all are easily patched. The good news: Exploits are hard (maybe) and so far none are known.

chinese flag soldier

China and Germany in a dust up over cybersecurity

Germany calls out China on their lack of progress on bilateral cybersecurity efforts, while China continues to target German companies for intellectual property theft.

Load More