Archive

Back to homepage
Hardware/Network

A Quarter of Businesses Have No Control over Network Privileges

While data breaches stemming from insider privilege abuse continue to make headlines, the sad reality is that a full quarter of organizations have zero control over who accesses what in

Cloud

How can I ensure the best cloud storage security?

Security is a major concern with many IT services, including cloud storage. Enterprise-class cloud storage providers offer several tools to protect business data and control access. What cloud storage security

Mobile

Half of Android devices open to silent hijack

Two-pronged attack can turn legit apps into spyware Hacker Zhi Xu has found that seemingly legitimate apps can unleash a hidden dark side to compromise almost half of all Android

Identity Theft

Insurance hack leads to ID theft concerns

“On January 29th, 2015, Anthem discovered a cyber attack ,” read Mertlich. “I don’t think it is a coincidence that I get a letter in the mail and very soon

Industry Insights

Fighting Cyber Crime

The North Shore Technology Council’s March business breakfast features a panel of cyber security experts: William Guenther, Board Chairman of the Advanced Cyber Security Center; Barbara Anthony, Senior Fellow at

Software

Favicons used to update world’s ‘most dangerous’ malware

Developer Jakub Kroustek has found new features in the dangerous Vawtrak malware that allow it to send and receive data through encrypted favicons distributed over the Tor network.… Read the

BYOD/Big Data

Law enforcement and security agencies face big data challenge

Law enforcement and security agencies face the same big data challenge as business, according to John Wright, global director of public safety and justice solutions at Unisys. Predictive data analytics

Cloud

What policies should be in a cloud infrastructure security program?

Cloud security expert Dan Sullivan outlines policies and security controls enterprises should put in place when putting a cloud infrastructure security program in place. Security policies should be driven by

Vendor News

Hexis Cyber Solutions Awarded 5-Star Rating in CRN’s 2015 Partner Program

Hexis Cyber Solutions (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, today announced it has

Hardware/Network

Short-Duration DDoS Attacks Becoming More Popular

Corero’s DDoS Trends and Analysis quarterly report finds that short bursts of attack traffic are an increasingly common form of DDoS attack. Distributed denial-of-service (DDoS) attacks are often associated with