Help Net Security
Worldwide server virtualization market is reaching its peak
The worldwide x86 server virtualization market is expected to reach $5.6 billion in 2016, an increase of 5.7 percent from 2015, according to Gartner. Despite the overall …

Impact of security breaches on consumer trust
High-profile data breaches are negatively impacting consumer trust in major brands, according to a new FireEye report. 76 percent of respondents would likely take their …

Financial services IT pros overconfident in breach detection capabilities
A new Tripwire study evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber …

Vulnerability management trends in Asia Pacific
A new study conducted by Forrester Consulting evaluated perceived challenges, drivers and benefits of various vulnerability management strategies and investments based on …

It’s time to get serious about ICS cybersecurity
As recently reported by The Register, a proof-of-concept PLC worm could spell disaster for the critical infrastructure by making attacks exponentially more difficult to detect …

Microsoft releases eight critical updates
Microsoft has released its May patch updates and it was a rather large deployment with 16 total updates this month. The critical versus important updates were split down the …

Universities to help train IBM Watson for Cyber Security
IBM Security announced Watson for Cyber Security, a new cloud-based version of the company’s cognitive technology trained on the language of security as part of a …

GDPR challenges all organizations to mask EU data by default
Organizations need to re-architect operations and adopt a secure, data-first approach ahead of the introduction of the European General Data Protection Regulation (GDPR). The …

Docker Security Scanning: Generate a security profile for Docker images
Docker announced Docker Security Scanning, an opt-in service for Docker Cloud private repo plans that provides a security assessment of the software included in container …

Let’s stop talking password flaws and instead discuss access management
A good bit of attention has been given to a new report that suggests that there are organizations that don’t change their administrative passwords at all, ever. While it may …

Evaluating the security of the top enterprise apps
Wandera announced the findings of a comprehensive security assessment of the most popular business apps used on corporate mobile devices by enterprise customers across North …

Playbook: Prepare your business for DDoS attacks
Like any business initiative, good preparation and planning can go a long way toward making the DDoS response process as manageable, painless, and inexpensive as possible. …