Enterprise -- ChannelBuzz.ca - Another key software addition is a new Policy Optimizer, that uses network intelligence to find and remove legacy firewall rules...
Business Wire -- CyberArk, (NASDAQ: CYBR), the global leader in privileged access security, today announced record financial results for the fourth quarter and...
Infosec -- CSO Online - It has never been easier for cybercriminals to infect your business with malware or ransomware. A vast array of malware tools can...
Infosec -- Dark Reading - When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the...
Tech -- TechCrunch - A hacker who stole close to 620 million user records from 16 websites has stolen another 127 million records from 8 more websites,...
Web Marketing -- CMS Wire - Many enterprises don't believe they have a GDPR problem. Most enterprises think they have it under control. However, figures in the...
Infosec -- Infosec Island - Until recently, Chief Executive Officers (CEOs) received information and reports encouraging them to consider information...
Infosec -- TripWire - The State of Security - With all the Russian election hacking scandals in the news during and after the 2016 Presidential election,...
Infosec -- Security Affairs - Expert discovered a privilege escalation vulnerability in default installations of Ubuntu Linux that resides in the snapd...
Infosec -- Threat Stack - Earlier this week security researchers Adam Iwaniuk and Borys Poplawski published details on a vulnerability in runC, the underlying...
Infosec -- Recorded Future - At the end of each year for the last two years, I have written articles predicting trends in ransomware for the next coming...
Enterprise -- Palo Alto Networks Blog - Every second matters when responding to an attack. Today, many security analysts are inundated with imprecise alerts...
Enterprise -- Azure Field Notes - I'm writing this post to highlight a problem I've encountered with User Defined Routes/Route Tables, and their implementation...
Enterprise -- ChannelBuzz.ca - Carbonite retreads a path that others have taken with their announced purchase of Webroot, bringing together natural adjacencies...
Globe Newswire -- Tenable(r), Inc., the Cyber Exposure company, today announced that the company more than doubled its Cyber Exposure Ecosystem throughout 2018,...
Globe Newswire -- Technology - Check Point's researchers detect growth of 'SpeakUp' - a new Linux backdoor which is spreading the XMRig crypto-mining malware...
Enterprise -- Architects Zone - According to Gartner, by 2022, API abuse will be the most frequented attack vector in enterprises. Today, a popular API security...
Business Wire -- Symantec Corp. today announced the acquisition of Luminate Security, a privately held company with pioneering Software Defined Perimeter technology.
Infosec -- Malwarebytes Unpacked - Active malvertising campaigns in December and the new year have kept exploit kit activity from hibernating in winter...
Infosec -- Threatpost - A fundamental component of container technologies like Docker, cri-o, containerd and Kubernetes contains an important vulnerability...
Infosec -- Threat Stack - In a recent study, 72% of CISOs stated that their teams are facing alert fatigue, while 82% of respondents to a Threat Stack survey...
Enterprise -- Palo Alto Networks Blog - Today, we're excited to announce PAN-OS 9.0, the latest version of the software that powers our next-generation firewalls....
Business Wire -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today released the results of its Cyber Risk Index...
Business Wire -- McAfee, the device-to-cloud cybersecurity company, announced today that CRN(r), a brand of The Channel Company, has named Ken McCray, head of...
Business Wire -- More businesses and organizations deserve modern, realistic cyber security. To reach that wider range of customers, CI Security is announcing...
Think -- Big Think - Russia hopes to find out how smoothly it could transition to a self-contained internet in the event foreign actors tried to disconnect...
Enterprise -- ZDNet Blogs - A security vulnerability has been disclosed for a flaw in runc, Docker and Kubernetes' container runtime, which can be used to...
Enterprise -- Network World News - Red Hat announced a vulnerability this morning - one that can be exploited if a user runs malicious or modified containers....
Enterprise -- DevOps.com - DevSecOps is changing our perspective toward security and is equipping us to deal with its challenges in an intelligible manner....
Enterprise -- VMblog - Kaspersky Lab is announcing the availability of its DDoS Q4 2018 Intelligence Report , which covers statistics of last quarter of the...
Media -- USATODAY - Tech Top Stories - Fifty-five percent of IT security experts in the auto industry admit to making coding errors; 60 percent say those...
Infosec -- CyberScoop - Information about more than 14 million Instagram accounts is being kept in an insecure database that could render users vulnerable...
Infosec -- Naked Security - A trio of bugs could have opened Android 7, 8 and 9 to remote attackers wielding booby-trapped image files. Here's what you...
Infosec -- The Hacker News - Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices...