Security News & Reviews - Page 6

More Security News

Phishing C Suite

Google Study Finds Phishing Most Likely Cause of Account Takeovers

|
Google conducted a year-long study with researchers from University of California , Berkeley that shows users are far more at risk from phishing attacks than from keyloggers or data breaches.
New Wave WannaCry

Financial Impact of NotPetya Ransomware Keeps Rising

| Updated
Pharmaceutical vendor Merck is the latest multi-national firm to report financial losses from the NotPetya ransomware attack in June 2017.
AWS.endpoints

AWS Expanding Private Cloud Services with PrivateLink Endpoints

|
AWS Endpoints have been a popular way among users to securely access S3 and DynamoDB from an Amazon virtual private cloud without the need for an internet gateway.
cyber attack

CISOs Urged to Hack Their Own Networks to Find Security Weaknesses

|
At Gigamon's Cybersecurity Summit Nov. 8 cyber-security experts shared their recommendations with CISOs charged with preventing data breaches like the one that rocked Equifax.
bracket computing

Bracket Computing Detects Cloud OS Threats With Server Guard

|
Bracket Computing updates its cloud computing workload technology with new security inspection capabilities that can detect and block hacker activities.
cloud security

Amazon Web Services Adds New Services to Bolster Cloud Security

|
Ahead of its annual re:invent conference, Amazon announces new security capabilities for its S3 storage service and the AWS PrivateLink for secure private cloud service access.
1088_EndpointSecurity

Top Endpoint Security Providers According to Gartner Research SLIDESHOW

|
Gartner's 2017 endpoint security Magic Quadrant report shows which companies are among the best providers of software and services that guard against viruses, malware and cyber-attacks.
Two Factor Authentication Ignorance.

Vast Majority of Users Don't Use Two-Factor Authentication: Survey

|
Only 28 percent of users actually use a second method of identifying themselves on any of their online accounts, according to a survey conducted by authentication firm Duo Security.
Crowdstrike Falcon

CrowdStrike Falcon Shines Spotlight on Vulnerability Management

|
The new module aims to help identify the true state of software patching, looking beyond what an operating system registry reports.
DDoS.attack.YouTube

Why U.S. Enterprises May Be Overconfident About DDoS Defenses

|
Survey results reveal 88 percent of U.S. businesses are confident in the current state of DDoS threat mitigation–the highest proportion in the international study–despite high percentage of verified attacks.

Shape Security Introduces BlackFish AI to Combat Credential Stuffing

|
The new technology uses a bloom filter computer science approach to help detect potentially breached passwords before a breach is publicly disclosed.
1088_Caine9LinuxForensic

CAINE 9.0 Linux Helps Investigators With Computer Security Forensics SLIDESHOW

|
The new Quantum release of the security-focused Linux distribution gains new tools to help researchers with forensic investigations.

Enterprise Tech Videos