Because hackers are increasingly targeting healthcare organizations in search of valuable patient information, it's more important than ever to ensure that data remains inaccessible to intruders. In addition to using the very latest techniques to fight malware, hospitals, clinics and others need to use effective...
As security threats are more sophisticated today than in the past, modern data centers are becoming increasingly vulnerable. Micro-segmentation is your answer to protect your data center against these sophisticated threats. Read this trend brief to see how it builds security into the DNA of the data center for a...
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates, which are already selling for more than $1,000 each in...
An increasing number of sophisticated, high-performance security and content-aware devices are at layers 4
through 7. This calls for, among other things, even greater sophistication of network emulation from test equipment. When Layer 4-7 devices are not properly tested, they face a greater risk for failure within...
Along with DNS, digital keys and certificates are at the foundation of any layered cybersecurity defense. Moreover, keys and certificates are akin to HLAs (Human Leukocyte Antigens) because they serve as unique identifiers giving authorized users access to encrypted systems.
But vulnerabilities, such as Heartbleed...
We've all heard about Apple's refusal to comply with a court order to assist the FBI in bypassing security features built into an iPhone that was issued to a San Bernardino shooter. The resulting debate - and the implications for law enforcement, national security, privacy and personal freedom - have led to serious,...
The adoption of encrypted Internet traffic has exploded in recent years due to security and privacy concerns. Today, it is estimated that more than 65% of Internet traffic will be encrypted by the end of 2016. This increase in encrypted traffic has created a more secure exchange of data"but it has also created a space...
The security of Internet-connected toys is in the limelight after toymaker VTech acknowledged suffering a data breach that affects 5 million accounts and personal information and photographs relating to more than 200,000 children.
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
Ellen Richey of Visa, keynoter at the April 29 Fraud Summit San Francisco, outlines key card fraud-fighting trends for the year ahead, including the U.S.'s migration toward EMV, greater use of tokenization and heightened fraud detection.
Tech companies continue to respond to the Heartbleed vulnerability by issuing alerts and patches to mitigate potential data compromises. Learn the latest advice from Trend Micro and ICSA Labs, plus updates from Rackspace, Akamai and Bitcoin.
Technology companies Cisco and Juniper Networks have issued alerts about which of their products are vulnerable to the Heartbleed bug. Learn about the latest developments.
As news of the Heartbleed bug continues to spread, government agencies in the U.S. and Canada are issuing statements on the vulnerability. Find out the latest on this threat and what thought-leaders are saying.
The chief executive of the Finnish company that uncovered the Internet website vulnerability known as Heartbleed says security practitioners should rethink how they approach IT security by placing a greater emphasis on vetting software for vulnerabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.