Table of Contents How to handle security risks in Red Hat virtualization environments Google is already fighting hackers from the future with post-quantum cryptography If My Website Is Hacked and Customer Data Exposed, Am I Liable? Business travellers putting organisations' cyber-security at risk Protecting a BIT of Integrity BYTES Global…
Security Industry News – 2016-07-10
Table of Contents Novosco buys UK IT security services firm NetDef Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report Thai companies beef up security as malware threats evolve Kaspersky ATM security solution promises big malware defense in a small package Cybersecurity firms step up intel…
IT Security News – 2017-07-08
Table of Contents Commission boosts cybersecurity industry and steps up efforts to tackle cyber-threats Endpoint and Network Security: The rise of “Defense in Depth” EU to invest €450 million in cybersecurity partnership fund The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges Password…
Incident Response Newsalert – 2016-07-07
Table of Contents Breach Secure Now!’s New Breach Prevention Platform Provides MSPs with Tools to Minimize the Chance of Client Data Breaches Data Breach Digest: Breach trends that will define incident response Risk analytics market to experience serious growth Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets…
Security Industry News – 2016-07-07
Table of Contents 10 cutting-edge tools that take endpoint security to a new level mindSHIFT unveils new proactive IT security offerings to protect customers' information Kroll Names J. Andrew Valentine Associate Managing Director in Cyber Security and Investigations Practice Despite Decline, FireEye Is Still Not Cheap Faraday: Collaborative pen test…
Newsalert – 2015 Apr 23
**Threat intelligence programs maturing despite staffing, tech obstacles** During a Tuesday session at RSA Conference 2015, entitled “Threat Intelligence is Like Three-Day Potty Training,” Forrester Principal Analyst Rick Holland used the analogy to highlight how threat intelligence is increasingly becoming a requirement for enterprises, but building a program and advancing…