IT Security Shifts From Reactive to Proactive
With security threats growing more sophisticated, the market for information security products is expected to boom over the next five years, led by security testing, IT outsourcing and data ...Full Article
Study: Corporate-“Shadow” IT Gap Puts Cloud-based Data in Peril
As corporate data – much of it sensitive – flies to the cloud in growing volume, a serious disconnect between corporate and “shadow” IT has developed in recent years, ...Full Article
Cray and Deloitte Join Supercomputing with Security-as-a-Service
When cyber-criminals look at your network, what do they see? Providing the adversary's perspective on computing infrastructures they're intent on attacking is a core concept of a new "cyber ...Full Article
Datacenter Security Attracts More Investors
Efforts to lock down security in datacenters continue to expand as operators seek to assure enterprise customers they can meet increasingly strict regulatory and other data governance rules even ...Full Article
SIEM Gains as Consumer Security Software Fades
Security information and event management (SIEM) software fueled a robust global security software market in 2015 even as sales of consumer security software declined sharply last year, according to ...Full Article
A User Guide For Securing Docker Containers
As important and prevalent Docker containers are today, they still pose a unique security risk for users. Containers simplify the distribution of software and allow greater sharing of resources ...Full Article
NSA Looks to IT Industry to Harden Vulnerable U.S. Nets
U.S. intelligence agencies, including the National Security Agency, are increasingly turning to commercial solutions in their efforts to head off the alarming number of cyber attacks that culminated in ...Full Article
Researchers Endorse ‘Quantum-Safe’ Cloud Security
With cyber attacks on IT infrastructure growing more sophisticated and costly by the day, researchers are looking for new ways to stay ahead of hackers by strengthening encryption. Among ...Full Article
Machine Learning Leveraged to Spot Ransomware
Everyone seemingly is complaining about the spread of ransomware, and now somebody is trying to do something about it using machine learning-based behavioral analytics techniques to track suspicious behavior ...Full Article
Protection in the ‘Data Path’ for Security across Hybrid Environments
Bracket Computing, the hot, highly funded hybrid cloud security platform company, today announced extensions to its “Computing Cell” cloud workload protection platform, a container-like “bubble” that enables “fluid” data ...Full Article