Thought leader Barrett Lyon recently joined Neustar as head of research and development, and he has some strong ideas on the future of cybersecurity - and how we can create what we envision.
A list of "super user" passwords - and a default username - now circulating online appears to allow unauthorized access to some webcam video streams, security researchers warn. If confirmed, it would be yet another massive internet of things security failure by a device manufacturer.
Your business relies on a Microsoft infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is.
Attackers do not care where your applications and data reside either. Their attack...
Network visibility, the ability to view your network traffic - data, voice, video, web services - end-to-end, and provide filtered streams of traffic to tools for further analysis, is a critical function of Network and Security Operations and essential to conducting smart business today.
This paper focuses on why...
A network tap (Test Access Port) is an inexpensive and permanent access port used throughout the network to enable monitoring and analysis without interrupting data transmission. With so many network taps available on the market, you have to ensure you have the best technology and value for your deployment by...
In an in-depth audio interview, Troy Leach of the PCI Security Standards Council describes just-released guidance that's designed to help organizations simplify network segmentation, a practice the council strongly recommends to help protect payment card data.
In the era of the cloud, the always-on workforce and high levels of digital literacy, your customers, prospects, staff and suppliers expect 24/7 network access and availability. However, 24/7 access is not enough; your data needs protection from any number of potential security breaches. These can happen when data is...
Coming soon to an internet service provider near you: routers infected by IoT device botnet-building malware such as Mirai. The latest victim is ISP TalkTalk, which is updating routers to block DDoS attackers who have been seizing control of the devices.
IBM will pay an unspecified amount to the Australian government for the vendor's role in the technical problems related to the recent online census, which dented public confidence in large-scale IT projects.
So, if 2016 was the year when mobile security threats finally started to materialize and mature, what can we expect to see in 2017? Tom Wills of Ontrack Advisory shares insight on the mobility threatscape and new enterprise solutions.
Your business relies on a Microsoft infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is.
Attackers do not care where your applications and data reside either. Their attack...
A Danish telecommunications company says it has seen successful DDoS attacks directed at enterprise firewalls that could be launched using only a single laptop.
Rising Cost of Breaches and Data Privacy Concerns Are Driving Encryption.
In response to the rising cost of cybercrime over the past several years, as well as concerns about protecting data privacy, organizations have increasingly adopted SSL encryption to safeguard their valuable information assets. It's expected...
Traditional firewalls and security systems can't keep up with the increasing onslaught of malicious encrypted traffic. To protect your data and your bottom line it's critical that you effectively inspect all SSL traffic. Download the eBook to learn the 6 keys for uncovering hidden threats, while ensuring performance...
U.K. Chancellor Philip Hammond used the launch of Britain's new five-year National Cyber Security Strategy to trumpet the country's strike-back capabilities. But other parts of the strategy - including more automated defenses - hold much greater promise.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.