March 6, 2019

Product Comparison: Web Application Firewall (WAF)

This side-by-side web application firewall comparison can help you determine which solution is the best for you and your clients. Security is a priority for all […]
March 6, 2019

Back to Basics with Cloud Security

Organizations are doing some fancy footwork with security these days in order to simultaneously protect users yet empower them to perform various tasks online. As application […]
March 5, 2019

New exploit lets attackers take control of Windows IoT Core devices

Speaking at a conference today, a security researcher has revealed a new exploit impacting the Windows IoT Core operating system that gives threat actors full control […]
March 5, 2019

Cybercriminals target Cisco routers after latest security patches

The router models, RV110W, RV130W, and RV215W were earlier patched for a serious security vulnerability which enabled arbitrary code execution in these devices. One of the […]
March 1, 2019

New Data Affirms Cyber Threat for Industrial Control Systems

Recent CyberX report finds that plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk for cyber attacks by Phil Neray, […]
March 1, 2019

Symantec Leads Unprecedented Industry Collaboration to Drive Down Cost and Complexity of Cyber Security

More than 120 Partners, Including AWS, Box, IBM Security, Microsoft, Oracle, ServiceNow and Splunk, Commit to Symantec’s Integrated Cyber Defense Platform. MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–Symantec Corp. […]
February 28, 2019

Cisco and Telenor Group Extend Partnership To Collaborate on Cloud, Security and Open vRAN for 5G

Barcelona – Mobile World Congress – February 27, 2019 – Cisco CEO Chuck Robbins and Telenor Group CEO Sigve Brekke met today to further strengthen the companies’ strategic collaboration […]
February 28, 2019

Getting Control of Security Controls

he effective deployment of technology depends on a business-level understanding of the organization. Technology on its own solves very few problems. However, when it is part […]
February 28, 2019

CentOS 6 and Red Hat Enterprise Linux 6 Get Important Kernel Security Update

An important kernel security update has been released for the CentOS 6 and Red Hat Enterprise Linux 6 operating system series to address a recently discovered […]
February 28, 2019

4G and 5G protocols prone to privacy attacks, new study reveals

The issue existed in the cellular paging (broadcast) protocol in the latest generation of mobile communications. An exploit called ToRPEDO was revealed by the researchers to […]