Veracode’s Supplement to the 2015 State of Software Security: Focus on Application Development report benchmarks application risk profiles by type…
Browsing: Data Protection
F-Secure researcher authors new report exploring how hackers are using third party services to spread malware and extract stolen data…
Nearly half (45 per cent) of all businesses recognise the serious threat posed by cryptomalware, also known as ransomware, –…
Netwrix 2015 Cloud Security Survey reveals unauthorised access and account hijacking are the leading security risks associated with the cloud…
Behavioural analytics applied to DNS traffic helps enterprises and services providers prevent data theft Infoblox Inc. (NYSE:BLOX), the network control…
Expands CTERA Enterprise File Services Platform to Feature Cloud-Agnostic Data Protection for Cloud Servers with Automated IT-as-a-Service Delivery CTERA Networks…
Open source: Security through transparency The contrast between proprietary and open source software is as old as the IT industry…
WinMagic to protect NCR cash machines globally with full disk encryption technology WinMagic Inc., the leading provider of encryption and…
Ransomware’s Early Days The first documented and purported example of ransomware was the 1989 AIDS Trojan, also known as PS…
Recent data breaches such as the Ashley Madison1 and TalkTalk2 sagas have painted a very grim portrait of the state…