cyber security
SoftIron Co-Founder, Mark Chen, Returns to Lead Company’s Secure Provenance Strategy as CSO
London – February 26, 2020 – SoftIron Ltd., maker of purpose-built and performance-optimized data center appliances, announces the appointment of Mark Chen to the role of Chief Security Officer. ...Full Article
‘Shadow IoT’ Undermining Network Security
The majority of Internet of Things transactions are unsecured, adding a new enterprise security threat as industrial and retail IoT traffic begins to ramp up. An enterprise IoT survey ...Full Article
Cloud Now Seen as a Security ‘Enabler’
Cloud security remains a challenge as more enterprises shift mission critical applications and data to hybrid deployments. As cloud adopters go native with applications and services, their cloud platforms ...Full Article
Hacker Survey: Simple Attacks Breach Systems in a Day
A security vendor survey of professional hackers finds that many are able to easily defeat “perimeter defenses” like firewalls, then pinpoint and steal critical data in less than a ...Full Article
Oracle Automates the Data Warehouse
Oracle Corp. released the first of what it says will be a string of cloud platform services based on machine learning that are designed to differentiate the cloud upstart ...Full Article
Crypto-Miners’ Latest Target: Containers
The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article
CSRA Emerges as U.S. IT Powerhouse
A well connected IT services provider formed through the merger of established government contractors is steadily extending its reach from providing cloud services the U.S. military to training the ...Full Article
U.S. Expands Cyber Training Effort
In order to secure enterprise networks and their far-flung components, everyone needs to be on the same page. That's at least part of the thinking behind a renewed U.S. ...Full Article
WannaCry Lingers, Cyber Analyst Warns
One week after a ransomware attack cut a swathe across Europe and China, a range of after-action analyses have emerged as to how the exploit unfolded and how the ...Full Article
New Malware ‘Bricks’ IoT Devices
Despite repeated assurances that Internet of Things security issues are being addressed, so-called "in-the-wild" attacks on poorly secured devices reveal that securing the IoT still has a long way ...Full Article