Video management systems (VMS) are the foundational application upon which security systems are ultimately built. However, yesterday’s video management solutions are not ideally suited to meet the...
In this interview with Help Net Security, Scott Best, Director of anti-tamper security technology at Rambus, talks about what organizations should be aware of when it comes...
We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data...
Code42 released a report, conducted by Vanson Bourne, which found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak...
Cymulate reveals that web application firewalls are the least effective security solutions, making them prime target for adversaries and high risk points for organizations. Consequences of the ineffectiveness of web...
The two-year campaign targeted sensitive but unclassified information stored by defense industrial base companies. Russian hackers are getting a look at U.S. military weapons development and...
DTEX Systems announced the release of a report which identifies a significant increase in industrial espionage incidents and the rise of the super malicious insider persona, and provides...
A new Crowdstrike report describes a dramatic increase in activity from both criminal and smaller nation-state groups. Among a ballooning set of global ransomware perpetrators are...
The PCI Security Standards Council (PCI SSC) and the National Cybersecurity Alliance issued a joint bulletin on the increasing threat of ransomware attacks. What is the threat? Ransomware...
Microsoft is enabling a Microsoft Defender ‘Attack Surface Reduction’ security rule by default to block hackers’ attempts to steal Windows credentials from the LSASS process. When...