Intelligence & Analytics January 9, 2017 The Four Leading Security Threats of 2017 2 min read - Long-standing security threats such as social engineering are predicted to take on new dimensions in the year ahead.
January 5, 2017 The FTC Will Pay for an IoT Patching Tool 2 min read - The FTC will sponsor a contest during CES 2017 to develop an IoT patching tool that enables users to promptly update software and eliminate vulnerabilities
Artificial Intelligence January 5, 2017 Using Cognitive Security to Fight the Cybersecurity Borg 2 min read - IT teams face a security landscape that is, like the Borg in "Star Trek," persistent and technologically superior. Cognitive security is IT's best hope.
Application Security January 4, 2017 IoT Security: Who Is Stepping Up? 4 min read - Government agencies, customers and device manufacturers must develop better IoT security practices to protect the growing number of connected devices.
Intelligence & Analytics January 2, 2017 2017: A New Year’s Security Resolution 3 min read - IT leaders should make a security resolution to improve basic hygiene, back up data regularly and share threat information to fight cybercrime in 2017.
X-Force December 20, 2016 Year in Review: Top Three Cybercrime Threats of 2016 5 min read - The top three cybercrime threats of 2016 shed some light on what happened in the past 12 months — and what to expect in the year ahead.
X-Force December 16, 2016 2016: The Year of the DDoS Attack 2 min read - In 2016, the year of the DDoS attack, cybercriminals hijacked millions of IoT devices to create massive botnets they used to take down popular websites.
Cloud Security December 12, 2016 Secure Your IoT Deployment by Paying Attention to These Four Factors 3 min read - It has never been more important to secure your IoT deployment. Challenges include lack of visibility, inexperience and the IoT's increasing complexity.
Application Security December 12, 2016 Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications? 3 min read - Bluetooth security is not strong enough to keep fraudsters from eavesdropping on sensitive communications. The upcoming Bluetooth 5 offers enhancements.
Threat Intelligence December 1, 2016 Mirai Evolving: New Attack Reveals Use of Port 7547 2 min read - Cybercriminals recently discovered how to modify the Mirai botnet source code, which leaked in September, to compromise devices remotely via TCP port 7547.