Wanted: IoT Interoperability, Security Specs
Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article
Cyber Skills Gap Grows Along With Threats
A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that ...Full Article
Startup Targets Runtime Container Security
Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to ...Full Article
Google Expands Cloud Encryption Options
Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The ...Full Article
Machine Learning and Online Security in 2017
As companies increase their digital footprints, ‘identify and diagnose’ capabilities will not defend against the growing array of security threats, according to analysts at Gartner Group. Because the types ...Full Article
How Retailers Can Fend Off FlokiBot Malware
The holiday shopping season is upon us, and with increased retail activity there is a corresponding increase in security threats. While many are concerned with online shopping, in-store retail ...Full Article
Forecast: Hackers Target Software-Based Nets
Among the growing list of security threats expected to expand in the coming year are hackers probing emerging software-defined infrastructure for vulnerabilities. According to a security forecast released this ...Full Article
The New Cyber Security Minefield: A Proactive, Not Reactive, Approach
In 2016, the cyber landscape shifted dramatically – at least on the adversary side. In the last few months alone, we’ve seen hackers penetrate organizations from the DNC to ...Full Article
Another IT Security Deal Targets Docker Containers
As enterprises seek ways to nail down IT security for a growing list of open-source infrastructure distributions, the security sector is moving toward critical mass with an increasing number ...Full Article
Targeting Open-Source Security Bugs
Seeking to spot potential security vulnerabilities in systems that increasingly rely on open source software, software license optimization vendor Flexera Software has acquired a specialist in identifying potentially vulnerable ...Full Article