Security News
While most organizations are committed to the full adoption of both agile and DevOps, many are struggling with key challenges and missing out on the extensive benefits these practices can have on...
Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware won’t be flagged by antivirus solutions and often even by network...
Encrypted ID 'Hubs' Will Safely Store Personal DataAfter a year of brainstorming on blockchain technology, Microsoft says it will add support in its Authenticator app for a decentralized identity...
82% of businesses are currently deploying a mix of cloud and on- premises infrastructure. Egnyte analyzed over 14 petabytes of data across thousands of businesses worldwide to better understand...
Canon has selected Vera to secure and protect Canon’s fleet of digital imaging and printing products and services. This partnership will help enterprises protect their intellectual property and...
Even for sensitive industries, the movement to cloud-based technologies is generally accepted as a cost-effective and efficient infrastructure strategy and immediate priority. The migration to...
Digital Transformation Without an Equivalent Security Transformation is Leaving Organizations More Vulnerable read more
Two new WD My Cloud vulnerabilities have been identified, adding to last month’s bevy of security bugs.
Digital extortion has evolved into the most successful criminal business model in the current threat landscape, and Trend Micro researchers predict that it will continue to grow rampant because...
F5 Networks announced the results of its 2018 State of Application Delivery report, which shows accelerating multi-cloud deployments are enabling organizations to select the cloud platform that...