Study: Consumer security savvy is way behind IoT threat landscape

A new Comcast study hints at a major risk to businesses, governments and public systems due to poor cybersecurity in the booming Internet of Things industry. The post Study:... Read more »

Computer Equipment Disposal policy

Computers, laptops, servers and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer, some equipment is recycled, and other systems are given... Read more »

GitHub offers secret scanning for free

Open source software development service has made it easier for developers using its public repositories to keep coding secrets and tokens close to the chest. The post GitHub offers... Read more »

Ransomware vs. Multi-Cloud: How to Protect Multi-Cloud Environments From the Next Attack

Ransomware vs. Multi-Cloud: How to Protect Multi-Cloud Environments From the Next Attack Though the scale and economics of the cloud are a boon for today’s enterprise, moving applications and... Read more »

Menacing Malware: Exposing Threats Lurking in your Linux-Based Multi-Cloud

90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that malware is... Read more »

Exposing Malware in Linux-Based Multi-Cloud Environments

THREAT REPORT: Exposing Malware in Linux-Based Multi-Cloud Environments 90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar?... Read more »

Advanced Threat Prevention with VMware NSX Distributed Firewall

Advanced Threat Prevention with VMware NSX Distributed Firewall Security professionals understand that hackers hide lateral movement inside large volumes of east-west network traffic. Organizations need new tools and techniques... Read more »

The security skills shortage is here, here’s how to prepare

Corporate security is near the top of the list of CIO concerns for 2023 — but a security skills shortfall is also a problem. What can companies do to... Read more »

Internal Firewalls for Dummies Guide

Organizations can no longer rely on edge firewalls alone to provide network security. Once attackers get past an edge firewall, they can move laterally to high-value assets. This book... Read more »

Intrusion detection policy

All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state... Read more »
Subscribe to our Newsletter