April 18, 2017 IBM Guardium Takes the Overall Leadership Position in the First Database Security Leadership Compass by KuppingerCole 3 min read - IBM Security Guardium was named the overall leader out of 10 vendors in the "KuppingerCole Leadership Compass for Database Security."
April 17, 2017 Cerber Ransomware Owns the Market 2 min read - According to recent reports, Cerber ransomware dominated the malware marketplace in the first months of 2017, reducing Locky to irrelevance.
April 17, 2017 Businesses Take a Strategic Turn Toward Encryption 2 min read - More organizations are taking a strategic stance to encryption, and they are deploying a range of technologies and techniques to keep data safe.
April 17, 2017 Magneto Vulnerability: Cybercriminals Drawn to E-commerce Exploit 2 min read - A newly released Magneto vulnerability comes with serious risk of total e-commerce compromise. Here's what businesses and shoppers need to know.
April 13, 2017 Automation Advancement: The Road to Emergent Security AI? 2 min read - Emergent security AI offers the potential for real-time threat detection and defense — what's the role of automation in this infosecurity endgame?
April 13, 2017 Masters Tournament Avoids Cybercrime Hazards With Watson for Security 3 min read - With the help of Watson for Cyber Security, we rounded off yet another successful year for the Masters, keeping all IT assets running smoothly.
April 13, 2017 SSL Certificates Now Need Mandatory Authorization Checks 2 min read - According to new guidelines, as of September 2017 SSL certificates will have to be checked against a dataset before they can be issued.
April 12, 2017 WiCyS 2017: Inspiring a Sense of Community Among Women in Cybersecurity 3 min read - This year's WiCyS conference brought 800 attendees from academia, research, government agencies and industry together March 31 to April 1.
April 11, 2017 Critical Vulnerabilities Put ICS Security at Risk 2 min read - A new potential problem for ICS security stems from CODESYS, a hardware-independent middleware layer for programming IIoT and ICS devices.
April 11, 2017 It’s a Good Time to Review the Security Risks of Obsolete Technology 4 min read - Legacy systems and platforms can pose serious problems for businesses. Consider the security risks that can come with obsolete technology.