Scott Ferguson Editor, Enterprise Cloud, | 12/13/2017
Enterprises of all sizes are getting more comfortable moving company data into the cloud. However, moving data from on-premises to off-premises requires a delicate balancing act of shared security responsibilities between enterprise and the cloud service providers they employ.
Manufacturers deal with sensitive data each and every day. This includes test and quality data, warranty information, device history records, and especially the engineering specifications for a product that are highly confidential. Trusting that data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully ...
Simon Marshall Technology Journalist, | 12/12/2017
When looking back at the 2017 threat landscape, what event had the most impact? In a troublesome 12-month retrospective, Kaspersky Lab reckons WannaCry -- indirectly aided by the US National Security Agency -- was the baddest boy on the security block.
Paul Shomo Sr. Technical Manager, 3rd Party Technologies at OpenText, | 12/12/2017
Hackers and analysts do battle with tools and techniques that are constantly evolving. Cybersecurity is an arms race, but it's not a fair one: the bad guys get endless "do overs" during the attack, yet a single InfoSec mistake could invite a breach. This burden of consistency is probably why the good guys are losing. However, something new is coming over ...
In the past several years, ransomware has inflicted financial losses estimated at billions of dollars -- and that's only what victims have reported to law enforcement. Described by security researchers as one of the most prolific and financially stimulating malware categories, ransomware has successfully been ported to all operating systems (OS), ...
Is it next-generation threat detection? Is it counter-hacking? One thing we know is that it's designed to lure hackers to a replica enterprise environment so that threats can be eliminated. It's deception.
Nick Claxson Managing Director, Comtec Enterprises, | 12/8/2017
Hollywood scriptwriters must have been kicking themselves when cyber thieves came up with the idea of ransomware. It has well and truly captured the imagination, driving genuine fear into the hearts of many business leaders who had hitherto paid little attention to cyber threats in general.
Scott Ferguson Editor, Enterprise Cloud, | 12/7/2017
New regulations, such as the European Union's General Data Protection Regulation law, are forcing enterprises to spend more of their IT budgets on security, which could push the overall market past $96 billion next year, according to new numbers from Gartner.
Giora Engel Vice President of Product Management, Palo Alto Networks, | 12/7/2017
A decade ago, countless single-purpose appliances cluttered enterprise networks. Network engineers created complex high-availability architectures to accommodate the firewalls, intrusion detection systems, secure web gateways, anti-virus gateways, anti-spam appliances and more that safeguarded network traffic.