Radio silence after reports of a headline-snagging ransomware payment in Jackson County, Ga., presents a possible case study in the pros and cons of paying ransomware attackers.
Since last year, endpoint-protection firms have been among the biggest movers and shakers in the cybersecurity realm – with the endpoint-security market seeing more than a typical share of acquisitions and strategic partnerships. Joe Stanganelli takes a look at why this might be happening.
IoT transformation is a gift and a curse that carries both business agility and business risk. As the world digitally transforms into something "smarter" than itself, IoT devices proliferate, demanding a lot of resources to keep up with them all – and, by extension, secure them all.
Cloud projects are big. Huge. So it's not perpetuating FUD to point out that cloud transformation still bears security and data-stewardship risks. But what appears too big a challenge for mere man might be no match for machine.
Zero-day vulnerabilities are serious, and on the rise. And IT-security teams make the problem worse when they fail to respond, or respond poorly, to responsible vulnerability disclosures.
Increase Operational Efficiency with Security Automation
Thursday, March 28, 2019Avoiding the Security Pitfalls of SD-WAN and Network Modernization
11:00 am New York / 3:00 pm London
Tuesday, April 9, 2019
11:00 am New York / 4:00 pm London
ARCHIVED | August 31, 2017, 3pm EDT
An interview with Steve Grobman, CTO of McAfee
Tweets by Security_Now_
like us on facebook