Security News

Infrastructure and network security The two fundamental building blocks to ensuring that your data is secure are physical infrastructure and network security. Understanding and protecting your...

Security team size at the largest organizations does not scale with the number of overall employees, but they are more likely to include staff with specialized roles, say the results of the latest...

SMBs are just as likely to experience a cyberattack as large enterprises, but a new report found that they lack the resources they need to stop them.

Bricata announced the latest release of its flagship product for immediate availability. This release permits its management console and new cloud sensors to be deployed in a cloud environment....

The Domain Name System (DNS) turns a user-friendly domain name into an IP address that computers use to identify each other. DNS is unencrypted by default. Most security vendors still heavily rely...

Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring

Two major new product announcements were made at Fortinet’s Accelerate 18 conference this week, including a new machine learning (ML) threat intelligence and detection offering, along with a major...

Enterprises Must Formulate a Plan of Action Through Testing and Remediate Issues Before They Get Out of Control read more

In 1987, Bernd Fix developed a method to neutralize the Vienna virus, becoming the first known antivirus software developer. In 2017, as we pass the 30-year anniversary, a lot has changed in...

These Prescriptive Steps Can Help the State of Security in Your ICS Network Environment read more