Scott Ferguson Editor, Enterprise Cloud, | 12/15/2017
Researchers at FireEye have identified a new piece of malware that they are calling Triton, which seems to have been designed to target industrial systems, as well as other critical infrastructure, and may have its origins with a nation state.
Mike O’Malley Vice President of Carrier Strategy and Business Development at Radware, | 12/14/2017
One of the biggest myths about cyber attacks is that they only happen to large companies. Sure, larger organizations get more than their fair share of headlines. Whether it's stolen user data, ransomware shutdowns, or DDoS attacks that cut off access to some of the Internet's most popular sites, larger organizations' inability to respond to cyber threats ...
Simon Marshall Technology Journalist, | 12/14/2017
Enterprises will start 2018 with plenty of metaphorical desk space for teams to plan their approach to what could be the toughest cybersecurity year on record. But it's the number of empty seats around the desks that will cause most alarm.
Scott Ferguson Editor, Enterprise Cloud, | 12/13/2017
Enterprises of all sizes are getting more comfortable moving company data into the cloud. However, moving data from on-premises to off-premises requires a delicate balancing act of shared security responsibilities between enterprise and the cloud service providers they employ.
Manufacturers deal with sensitive data each and every day. This includes test and quality data, warranty information, device history records, and especially the engineering specifications for a product that are highly confidential. Trusting that data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully ...
Simon Marshall Technology Journalist, | 12/12/2017
When looking back at the 2017 threat landscape, what event had the most impact? In a troublesome 12-month retrospective, Kaspersky Lab reckons WannaCry -- indirectly aided by the US National Security Agency -- was the baddest boy on the security block.
Paul Shomo Sr. Technical Manager, 3rd Party Technologies at OpenText, | 12/12/2017
Hackers and analysts do battle with tools and techniques that are constantly evolving. Cybersecurity is an arms race, but it's not a fair one: the bad guys get endless "do overs" during the attack, yet a single InfoSec mistake could invite a breach. This burden of consistency is probably why the good guys are losing. However, something new is coming over ...
In the past several years, ransomware has inflicted financial losses estimated at billions of dollars -- and that's only what victims have reported to law enforcement. Described by security researchers as one of the most prolific and financially stimulating malware categories, ransomware has successfully been ported to all operating systems (OS), ...