cloud security
See the following -
How Virtualized Systems Provide A Strong Platform For Business Continuity
Today’s virtualized systems provide a sound platform for business continuity because the platforms and networking are stronger and more agile than they were even a few years ago. Read More »
- Login to post comments
McAfee Labs Threats Predictions Report Previews Cyber Threats for 2017 and Beyond
Intel® Security today released its McAfee Labs 2017 Threats Predictions Report, which identifies 14 threat trends to watch in 2017, the most critical developments to watch for in cloud security and the Internet of Things (IoT) security, and the six most difficult-to-solve challenges facing the cybersecurity industry. The report reflects the informed opinions of 31 Intel Security thought leaders. It examines current trends in cybercrime and makes predictions about what the future may hold for organizations working to take advantage of new technologies to both advance their businesses and provide better security protection...
- Login to post comments
New Research Shows Attackers Turning to Encrypted Cyber Attacks During Pandemic
Zscaler, Inc...today released its 2020 State of Encrypted Attacks report, published by the Zscaler ThreatLabZ team. The threat research reveals the emerging techniques and impacted industries behind a 260-percent spike in attacks using encrypted channels to bypass legacy security controls. The report provides guidance on how IT and security leaders can protect their enterprise from the rising trend of encrypted threats, based on insight sourced from over 6.6 billion encrypted threats across the Zscaler™ cloud from January through September 2020 over encrypted channels. To download and read, see the 2020 State of Encrypted Attacks.
- Login to post comments
Over 90% Of Cloud Services Used In Healthcare Pose Medium To High Security Risk
According to cloud security vendor Skyhigh Networks, more than 13% of cloud services used in healthcare are high‒risk and 77% are medium risk ‒ as measured across 54 different security attributes (like data encryption and “two factor” authentication)...
- Login to post comments
Red Hat Summit: Open Source Trends, Cloud Outlook, Innovation And More
Open-source enthusiasts from around the world descended on Boston recently for the annual Red Hat Summit, an intensive technology conference sponsored by Red Hat Inc., a Raleigh, N.C.-based provider of Linux and open source technology. Read More »
- Login to post comments