Security News
Version 1.1 includes updates on authentication and identity, self-assessment, supply-chain security and vulnerability disclosure, among other changes.
In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well as the ideas behind...
Akamai Technologies' Tom Ruff explains three emerging threats that could be significant for startups, SMBs, enterprises, and governments, and what organizations can do to mitigate them.
Cybercriminals leverage attack surfaces as a way to penetrate an organization's infrastructure. Learn how to reduce attack surfaces and apply deceptive cyberdefenses.
In this podcast recorded at RSA Conference 2018, John Delk, Chief Product Officer and the General Manager of the security product group at Micro Focus, talks about how Micro Focus’ solutions...
According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organizations,” the average cost of an insider threat annually is $8.76 million. It’s critical for organizations...
A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful security infrastructure to...
The Domain Name System (DNS) turns a user-friendly domain name into an IP address that computers use to identify each other. DNS is unencrypted by default. Most security vendors still heavily rely...
Mainframes are the definition of mission-critical for countless businesses. Mainframes can run 1.1 million transactions per second and are at the core of the technology strategies within the...
Rockwell Automation CISO Dawn Cappelli Now Shifts Focus to External ThreatsFor years, Dawn Cappelli studied and wrote about the insider threat. Then she went to Rockwell Automation and built an...