Security

Subscribe Archives >
 

Hackers Use IoT Botnets to Launch Massive Attacks

6 days ago | by Tony Kontzer

The recent ransomware attack on an Austrian Hotel's room key system may have served as a wake-up call about the expanding risks introduced by the internet of things, but, as they say in show... Read More

 
 
 
 
 
 

LATEST STORIES

  • Data Breaches Affect Customer Loyalty
     
    Online security is full of holes, according to a recent survey of 9,000 consumers in the United States and 10 other countries. Most consumers who are active online—nearly six out of 10— believe they will be a victim of a data breach at...
     
    READ MORE
     
  • Addressing the IT Security Skills Gap
     
    Today's cyber-threats present challenges for even the most tech-savvy IT executives in the most tech-savvy organizations. It's not news that the volume and velocity of threats continue to grow. At the center of the problem? Recruiting and retaining...
     
    READ MORE
     
  • Why Cyber-Security Strategies Are Falling Short
     
    While organizations around the world are more confident than ever that they can predict and detect cyber-attacks, they're still falling short on investments and plans geared toward recovering from a breach. Such is the double-edged finding of EY's...
     
    READ MORE
     
  • Cyber-Attackers Target IP Assets
     
    The state of cyber-security has gone from bad to worse over the past couple of years. Not only are threats increasing in both frequency and intensity, they're also becoming more dangerous and costly. A recent study conducted by Deloitte,...
     
    READ MORE
     
  • Managing Personal & Work Identities in the Office
     
    The use of personal devices and personal accounts in the workplace has changed IT and enterprise security in profound ways. Today, employees think nothing of logging onto Facebook, Twitter and Instagram while at work, as well as accessing myriad...
     
    READ MORE
     
  • Why Augmented Reality and the IoT Increase Risks
     
    A significant number of organizations are adopting wearable technology, digital navigation and other forms of augmented reality (AR) to drive business, according to a recent survey from ISACA. The accompanying report, "2016 IT Risk/Reward...
     
    READ MORE
     
  • Is Enterprise Security Lost in the Cloud?
     
    The debate about whether to migrate to the cloud is largely over—and the cloud won. Yet, as adoption rates grow and IT systems become more interconnected with cloud architectures, the challenge of locking down security is growing. Overall,...
     
    READ MORE
     
  • Phishing & Ransomware: Attackers' Favorite Weapons
     
    A review of recent headlines provides the latest reminder that organizations are under siege. Companies like ADP, LinkedIn and Yahoo—as well as federal agencies such the FBI and IRS—have reported substantial breaches this year, and the...
     
    READ MORE
     
  • Companies Must Balance Speed and Security
     
    The need for speed is forcing many organizations to confront an inconvenient truth: While security is clearly critical to business, many enterprise leaders are still willing to cut corners and take risks. An October 2016 study conducted by Coleman...
     
    READ MORE
     
  • DevOps and Security Teams Are Still in Silos
     
    In theory, a DevOps culture stressing communication between software developers and IT operations professionals can improve application security by enabling organizations to find and fix issues more frequently and earlier in the process. In...
     
    READ MORE
     
 
 
 
 
 

Security Archives >

 
 
Manage your Newsletters: Login   Register My Newsletters