Security News & Reviews - Page 6
More Security News
In the first update since acquiring the virtual Application Delivery Controller (vADC) technology from Brocade, Pulse Secure adds centralized analytics capabilities to improve security.
Google has introduced a broad array of security enhancements for its cloud platform to help assure enterprises that they can move critical data and applications to the cloud with confidence.
The new IBM Cloud Hyper Protect product line includes four new services that are made possible by bringing IBM Z into IBM’s global public cloud data centers.
NEWS ANALYSIS: Facebook users have to be wondering if they can ever trust the social network to protect their data after company founder Mark Zuckerberg confirmed that it failed correct a breach it had known about since 2015.
Security Operations Centers are unable to respond to most of the alerts that are received and lack proper metrics as well as security control integration, according to a study commissioned by Fidelis Cybersecurity.
After being blindsided by a set of vulnerability reports that were disclosed without giving AMD time to analyze, the silicon vendor has now provided a technical assessment.
An IBM-sponsored study conducted by Ponemon Institute shows that most company don’t have plans in place to how to thwart cyber-attacks in place or contain potential data and business losses.
BlackBerry's secure container solution supports Microsoft's Office apps for secure on-the-go productivity.
The startup led by veterans of Israel's intelligence community emerges from stealth with a cyber-security platform that aims to detect advanced persistent threats.
GitHub celebrated the fourth anniversary of its bug bounty program, which awards security researchers for responsibly disclosing bugs in GitHub services.
DAILY VIDEO: The U.S. government accuses Russia of hacking the power grid, and Google enhances security management features in Chrome Enterprise.
NEWS ANALYSIS: A US-CERT report detailed how suspected Russian hackers broke into the networks of U.S. critical infrastructure installations and presented careful steps on how to prevent them in the future.