Security

Zimperium Mobile Threat Detection Available in Oracle Cloud

October 4, 2017
Zimperium Mobile Threat Detection Available in Oracle Cloud

In recent weeks we have been discussing some of the ways Zimperium delivers mobile threat defense (MTD) at scale. As the only true enterprise-class MTD solution available, we take that role seriously. So we are pleased to deliver another option for enterprises to implement mobile threat defense and take advantage of available infrastructure and resources. […]

Posted in Applications, Corporate, Private Cloud, Security | No Comments »

Cybercrime As Crime, According to US Secret Service

October 4, 2017
Cybercrime As Crime, According to US Secret Service

Did you know that the lingua franca used by hackers is Russian? That language, not English, is what cybercriminals of all nationalities use to share intelligence, recruit team members, and crow about their victories on the Dark Web. Just because the information is in Russian, that doesn’t mean the players are actually Russian. That’s one […]

Posted in Government, Security | No Comments »

Cohesity Orion 5.0: The Next Level of Hyperconverged Secondary Storage

October 3, 2017
Cohesity Orion 5.0: The Next Level of Hyperconverged Secondary Storage

Cohesity, the pioneer of hyperconverged secondary storage, has recently launched Cohesity Orion 5.0, the industry’s first storage platform that combines end-to-end data protection and big data storage on distributed, infinitely scalable architecture. The latest version of Cohesity’s groundbreaking secondary storage platform delivers radical efficiency by serving double duty as a backup solution and searchable archive […]

Posted in Data, Data Center, Security | No Comments »

Cracks in the cloud: The next frontier for cybercrime

June 11, 2017
Cracks in the cloud: The next frontier for cybercrime

The advantages of cloud computing—scalability, speed to market, lower costs and higher productivity—are well known throughout most industries. But for cyber criminals, this new, borderless infrastructure is a potential goldmine. According to a new Symantec survey on the state of enterprise data security, cloud security is a top concern for Indian chief information security officers […]

Posted in Security, Trends | No Comments »

Futuriom SysSecOps Reports finds major gaps in security strategies

June 11, 2017
Futuriom SysSecOps Reports finds major gaps in security strategies

Futuriom’s two-month study on integrated systems and security operations (SysSecOps) strategy, “Endpoint Security and SysSecOps: The Growing Trend to Build a More Secure Enterprise,” reveals that many IT and security operations managers have challenges in delivering a comprehensive information security approach, including inter-department coordination, endpoint security technology integration, and resources. The Futuriom survey of 149 […]

Posted in Research, Security | No Comments »

The CyberSecurity Scourge of Credentials Theft

April 8, 2017
The CyberSecurity Scourge of Credentials Theft

Cybercriminals want your credentials and your employees’ credentials. When those hackers succeed in stealing that information, it can be bad for individuals – and even worse for corporations and other organizations. This is a scourge that’s bad, and it will remain bad.

Posted in Security, Software, Trends | No Comments »

How Artificial Intelligence Is Changing the Face of Cyber Security

February 11, 2017
How Artificial Intelligence Is Changing the Face of Cyber Security

Let’s inject a virus into the attacking alien spacecraft and save Earth! Let’s hack into the enemy mainframe with six keystrokes and abort the torpedo launch!

Posted in Industry, Security, Trends | No Comments »

How vulnerable are Indian companies to cyber threats?

January 22, 2017
How vulnerable are Indian companies to cyber threats?

Indian enterprises are not confident about their ability to sense, resist and respond to cyber security threats, says a recent survey report by the global professional services firm EY.

Posted in Market, Security | No Comments »

The Real Costs of Web Malware Protection

September 26, 2016
The Real Costs of Web Malware Protection

By Kowsik Guruswamy, Chief Technology Officer, Menlo Security in reference to The Hidden Cost of Web Security Business Whitepaper. A ransomware attack is terrible for consumers, employees and businesses – and you can put a price tag on recovery.

Posted in Research, Security, Trends | No Comments »

Javelin Networks Redefines Detection and Prevention of Active Cyberattacks

September 26, 2016
Javelin Networks Redefines Detection and Prevention of Active Cyberattacks

Emerging from stealth mode, Silicon Valley start-up uses Artificial Intelligence to prevent any malicious movement inside an organization.

Posted in Development, Security | No Comments »