The FortiSandbox 2000E excels in the latest breach detection system test, earning Fortinet’s fourth-consecutive recommended rating.
CyberArk and Puppet are working together to create supported modules that provide automated, enterprise-grade protection of secrets.
GDPR is forcing companies around the world to revisit and revise how they manage and protect data in today’s interconnected cyber landscape.
Mulesoft sees custom point-to-point integration code as a serious issue for enterprise security which it can solve
Double Locker is two-step ransomware which adopts a dual-locking approach. In addition to encrypting all the user data, it also locks the device by exploiting its accessibility settings.
The company last week quietly patched vulnerabilities in the WPA2 protocol used to secure wireless networks, but did not reveal the fix until today.
The acquisition is also to expand Akamai’s distribution to carriers that serve enterprise customers.
Harsh will manage all aspects of enterprise business and work effectively with the leadership of Bhaskar Bakthavatsalu.
The Key Reinstallation Attack (KRACK) centers on several key management vulnerabilities in WPA2, the go to authentication standard in Wi-Fi
NSS Labs says Windows 10's default browser is better at blocking phishing and socially-engineered malware attacks than Google Chrome or Mozilla Firefox.
Kaspersky Lab experts have witnessed a significant number of high-profile cyber espionage attacks singling out countries in the Asia Pacific region, says Kamluk of Kaspersky Lab.
Kaspersky Lab warns that cyber-spy groups are moving towards using supply chain attacks and legitimate tools to attack financial institutions.
Google's Grafeas provides a common API for metadata about containers, from image and build details to security vulnerabilities
Intel says that the Saffron’s associative memory AI simulates a human’s natural ability to learn
At BoxWorks, Box also showcased its Box Skills Kit, which is built with a set of developer resources for designing custom Skills
Governments shouldn't be 'hamstrung' by attribution, says Chris Painter
Respondents expect their transition to the cloud, as part of the digital transformation journey, to be a catalyst for an increased focus on security.
Accenture had four cloud-based storage servers unsecured and publicly downloadable, UpGuard has revealed.
OnePlus phone maker is allegedly collecting user data without users' consent and is deleting related queries from its own community forum.
Latest release of Pega KYC and Pega CLM allows banks to stay compliant with latest regulations while reducing onboarding time and costs.