IoT Security Adopts a Platform Approach
As is often the case, network security tools are just now beginning to keep catch up with vulnerable Internet of Things deployments, particularly leading edge industrial IoT infrastructure. With ...Full Article
Harnessing App Development With ‘Low-Code’ Platforms
One of the offshoots of the open source movement has been the gradual rise of "citizen application developers" operating on enterprise-grade "low-code" platforms. While the approach is seen as ...Full Article
U.S.: Cybersecurity Must Go Beyond Passwords
If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts ...Full Article
Wanted: IoT Interoperability, Security Specs
Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article
Cyber Skills Gap Grows Along With Threats
A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that ...Full Article
Security News Ahead of RSA: Breach Worries Stop Digital Transformation
In advance of next week’s big RSA data security show in San Francisco, we’ve received a bevy of security product announcements from companies leveraging data analytics, AI, behavior analytics ...Full Article
Startup Targets Runtime Container Security
Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to ...Full Article
Security Survey: The Botnets are Coming!
A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released ...Full Article
“Why Don’t My Security Tools Work?” A Unified Cyber Defense Battle Plan
Threat actors are getting better, faster, and more efficient at compromising networks, taking only minutes or less to breach systems. Unfortunately, organizations are taking weeks, if not longer, to ...Full Article
Google Expands Cloud Encryption Options
Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The ...Full Article