U.S.: Cybersecurity Must Go Beyond Passwords
If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts ...Full Article
Wanted: IoT Interoperability, Security Specs
Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article
Cyber Skills Gap Grows Along With Threats
A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that ...Full Article
Security News Ahead of RSA: Breach Worries Stop Digital Transformation
In advance of next week’s big RSA data security show in San Francisco, we’ve received a bevy of security product announcements from companies leveraging data analytics, AI, behavior analytics ...Full Article
Startup Targets Runtime Container Security
Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to ...Full Article
Security Survey: The Botnets are Coming!
A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released ...Full Article
“Why Don’t My Security Tools Work?” A Unified Cyber Defense Battle Plan
Threat actors are getting better, faster, and more efficient at compromising networks, taking only minutes or less to breach systems. Unfortunately, organizations are taking weeks, if not longer, to ...Full Article
Google Expands Cloud Encryption Options
Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The ...Full Article
Container Encryption Targets Security, Downtime
Securing the contents of application containers based on Docker and other platforms has relied heavily on isolating individual containers from one another along with other access control approaches. Now, ...Full Article
Flaws Found in Security Software, Unlicensed Code
A flurry of industry surveys have flagged open source and unlicensed software as growing security threats. Moreover, a review released by Flexera Software also found that the very security ...Full Article