Unpacking Packed Malware
News Analysis 8/24/2017 1 comment
Executable compression is a common technique for hiding malware. The question is, what can you do to unpack the threat?
Personal Security Begets Enterprise Security
News Analysis 7/20/2017 2 comments
Employees' personal approach to information security is fundamentally crucial to their organizations' security posture. Accordingly, enterprises would do well to learn from recent hacks and rethink the way they train their employees in cybersecurity matters.
The Stress of Being CISO
News Analysis 7/3/2017 3 comments
The title 'CISO' carries with it some serious stress. A new poll talks about that stress and what to do about it.
Autonomous Cars Must Be Secure to Be Safe
News Analysis 6/13/2017 29 comments
All of the airbags and crumple zones in the world won't help if hackers can take control of self-driving cars. What can manufacturers do to keep these next-generation vehicles secure and safe?
The Security of SD-WAN
News Analysis 6/5/2017 Post a comment
With Software-Defined WAN (SD-WAN), lower costs and increased efficiency are the big payoffs. Is there a price to be paid in security?
Security, Cloud & the SBC
News Analysis 3/27/2017 Post a comment
Despite all the current hype surrounding 5G at the moment, it's cloud and security technologies that are fundamentally driving business growth opportunities for communications service providers.
Pay-TV Security Gets 50 Shades Darker
News Analysis 3/2/2017 Post a comment
Pay-TV providers are seeing new security threats and vulnerabilities every day, and are facing numerous challenges trying to tighten the security that protects organizations, as well as their customers.
Nokia's Efforts to Lead in Security
News Analysis 2/2/2017 Post a comment
Nokia is maintaining its strategic emphasis on network security and may have some plausible claims to be ahead of its major vendor rivals – but it still has a lot of questions to answer.
The infrared capabilities of security cameras provide a new way for attackers to reach systems that have no connection to the Internet.
A new report by F5 and Ponemon looks at the state of the CISO in modern enterprises.
Companies are worried about security in the public cloud, but a new survey shows they don't understand the basics.
A growing number of security and networking vendors are talking about intent-based security as a next-gen solution.
The hack that put malware on an update of a popular security program was not the work of a first-time malware author.
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
An interview with Steve Grobman, CTO of McAfee