Edge Computing Is a New Frontier for Cybersecurity
Distributed, ubiquitous computing infrastructure can come at the price of a much bigger attack surface.
Edge Computing Is a New Frontier for Cybersecurity Read More »
Distributed, ubiquitous computing infrastructure can come at the price of a much bigger attack surface.
Edge Computing Is a New Frontier for Cybersecurity Read More »
Explaining the NIST Cybersecurity Framework, the most popular of its kind.
The Must-Haves for Your Data Center Cybersecurity Checklist Read More »
In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just part of the answer, however.
What is quantum cryptography? It’s no silver bullet, but could improve security Read More »
Backstory, a nascent Google cybersecurity unit’s first product, aims to protect enterprise infrastructure on-prem and in the cloud.
Can Google Become the Next Big Cybersecurity Vendor? Read More »
“This is really a broader industry concern about the firmware layer being effectively ignored by almost everybody.”
Bare-Metal Cloud Firmware Security Fail Isn’t Limited to IBM — by Far Read More »
The most critical infrastructure in the data center also happens to be the most overlooked one by cybersecurity teams.
Is Your Data Center Power System Protected from Cyberattacks? Read More »
New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.
Should There Be ‘Safe Harbor’ Against Data-Breach Lawsuits? Read More »
Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.
What is biometrics? And why collecting biometric data is risky Read More »
Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.
Here’s What Cybersecurity Experts Worry About This Year Read More »
Network security is an around-the-clock battle. Agency cybersecurity teams are left with skeleton staff, and many furloughed security experts may not come back.
In the Shutdown, the US Government Is Flirting with Cybersecurity Disaster Read More »
“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.
A New Type of Network Is on the Rise to Combat the Quantum Threat to Encryption Read More »
Moving data and processes to the cloud presents challenges for enterprise SOCs. Here’s how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data.
How security operations centers are adapting to the cloud era Read More »
Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.
Newer isn’t always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.
8 old technologies that still play roles in security Read More »
Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.
Cryptojacking: The Hot New Type of Attack on Data Centers Read More »