Wiz sees big impact of AI on runtime security, but also stresses old threats
Cloud security has evolved beyond a specialized domain to encompass virtually all aspects of modern cybersecu...
Cloud security has evolved beyond a specialized domain to encompass virtually all aspects of modern cybersecu...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Cybersecurity researchers have discovered an error in recent Intel chips that allows a criminal to penetrate ...
A new vulnerability has been discovered in Linux, Android, macOS and other Unix-based operating systems. Mali...
McAfee is considering a merger or partnership of some kind with NortonLifeLock, its direct competitor in the ...
Sophos has made two new innovations available. The biggest innovation is SophosLabs Intelix, a cloud-based to...
Amazon Web Services yesterday announced three new solutions for cloud security. These are Amazon Detective, I...
During the recent ESET Press Tour in Bratislava, we received an update about what the security company is cur...
A newly discovered trojan focuses on organisations in health care and education. It is a tailor-made, Python-...
Microsoft is in the process of developing a programming language aimed at ensuring security. The company itse...
G DATA has released a number of predictions for 2020. This includes an increased use of automation in cyberat...
A pre-existing botnet has changed its behaviour by switching to cryptomining. To do this, it uses YouTube as ...