Sign up | Login with →

Security

IBM Opens Up Its Threat Data as Part of New Security Intelligence Sharing Platform

April 18, 2015 by Sarah Smith

IBM.

IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders. On Thursday, the company opened up over 700 terabytes of data about vulnerabilities, attacks and other threats through a new cloud-based threat intelligence sharing platform called IBM X-Force Exchange. Other organizations can use the platform to share or confirm their own data, so they can more efficiently respond to security incidents.[read more]

exclusive

Malicious Tool Provides Attackers with a New Type of Zombies

April 15, 2015 by Sophie Davidson

Cyber criminals.

An interesting concept which has really emerged only lately - IoT, or: “the Internet of Things”, has recently been in the scope of cyber criminals and internet security specialists. The IoT is a vision, rather than an actual network. It's the notion that with increasingly more devices empowered by communication facilities, those devices inevitably end up as entities in a network scheme.[read more]

exclusive

How to Clean Up the Mess: Surviving a Data Breach

April 14, 2015 by Neill Feather

Data breach.

Here’s a scary thought: Nearly half (43%) of all companies experienced a data breach last year, most of which took weeks to discover. For many businesses, these data breaches were catastrophic to the point of bankruptcy (the average cost of a single compromised record being more than $194).[read more]

Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers

April 9, 2015 by Sarah Smith

Cyber security.

These days, cyber attacks are the biggest threat to companies and governments around the world. Even President Obama recently laid out a comprehensive plan to tackle cyber security issues. It remains to be seen what results Facebook's ThreatExchange can produce. Still, any platform that brings cyber security experts together and encourages them to share data is a positive development. Hackers are only going to step up their efforts, and security experts need to respond with a concerted effort.[read more]

exclusive

A Look at How Keyless SSL Works

March 28, 2015 by Anand Srinivasan

Secure socket layer.

Secure Socket Layer, or SSL for short, is one of the key elements to providing a safe and secure web transaction. Websites that offer financial services or handle confidential user information have for long used SSL technology to encrypt such sensitive data and thus deter hackers from stealing them.[read more]

Protecting Your Data Wherever It Goes [INFOGRAPHIC]

March 5, 2015 by Zach Taiji

Your data.

In today’s world, the top four places your data is at risk is the cloud, email, third parties and mobile devices according to a new study by information security company Seclore.[read more]

exclusive

From Police to Partner: The Changing Role of IT

December 12, 2014 by Tom Smith

IT security / shutterstock

IT professionals must adopt a new role that strikes a balance between employee needs and preferences and security. Here are four things you need to effectively become a partner rather than a policeman, while maintaining a secure company infrastructure.[read more]

exclusive

Scary Security Concerns With the Internet of Things

December 5, 2014 by Rick Delgado

IoT.

Internet security is already a multibillion dollar industry, and having to add new features in order to grant greater protection for the new IoT promises to make this industry ever more expansive. However, this means that the burden of promising to provide the utmost in security is even greater than before.[read more]

Dynamic Cybersecurity Needs: Reassessing Security

November 30, 2014 by Thu Pham

cybersecurity needs

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic - 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.[read more]

Big Data Ethics and Your Privacy [INFOGRAPHIC]

November 29, 2014 by Mark van Rijmenam

Internet saturated nations

Unlike a few years ago, a lot more people understand that services like Google, Facebook or Twitter are not free of charge, but are paid for with our data. How do we feel about that? How do we feel about privacy and security? And what are some of the common Internet values related to privacy?[read more]

exclusive

Mobile Apps, Business Apps and Network Security

November 28, 2014 by Rick Delgado

mobile apps

Today’s cybercriminals are inventive. They’re creative and find an increasing number of ways to access and exploit personal and professional information. Criminals aren’t respectful of the work-life balance. If we use our personal computer at work, and then bring it home for personal use, our work information on the device is still up for grabs.[read more]

exclusive

Protecting Your Business from Shellshock

November 19, 2014 by Rick Delgado

Shellshock

Shellshock is a bug that affects the UNIX-based shell, found commonly in Linux and Apple operating systems. The vulnerability allows attackers to remotely execute code on these machines, leading to data theft, malware injection and server hijacking. Here are a few ways to protect yourself.[read more]

exclusive

Warning! When Big Data Turns Bad

November 18, 2014 by Bernard Marr

As with all game-changing technologies, Big Data has the potential to be used for evil, as well as good. There are two common ways that “bad things” will often happen: malice, or maladministration. Sometimes big data technology is misused to deliberately cause harm to others, and sometimes it is simply used incorrectly, therefore causing harm.[read more]

Self-Healing Virtual Machines Coming to Datacenter Near You?

November 18, 2014 by Natalie Lehrer

One of the more exciting inventions in data center technology has been developed by a team of computer scientists from the University of Utah. The invention is being called A3 which is short for Advanced Adaptive Applications. When unusual activity is detected, A3 tries to automatically repair the code infraction.[read more]

exclusive

What Every Business Owner Needs to Know About Data Sovereignty

November 16, 2014 by Ajay Patel

Protecting your data

Lately data protection has become the number one concern for business owners. However, if you want full data protection, you should understand what’s behind data sovereignty. From knowing up-to-date laws and regulations to understanding cloud technology, you can ensure data privacy for your business and your customers.[read more]