IBM this week unveiled it's latest mainframe IBM Z, which is capable of running more than 12 billion encrypted transactions per day.
Research from RedLock Inc. reveals numerous security problems in public cloud environments, finding 82 percent of hosted databases remain unencrypted, among other multiple issues.
Security, digital transformations and continuous delivery figure prominently.
Juniper Networks Inc. has added new virtual firewalls to its Software-Defined Secure Networks (SDSN), a suite of products that applies to network security the "software-defined" technique of disaggregating software and hardware.
IBM yesterday announced a new mainframe called the z13s that's optimized for security in hybrid cloud environments.
Researchers at FireEye said they've discovered a malware that infects Cisco Systems Inc. routers with a modified firmware that spys on Internet and network activity, an approach that might be evading normal security measures.
A group of prominent cryptographers said that the planting of backdoors for law enforcement surveillance -- in an effort to crack down on cybercrime -- is actually creating more network vulnerabilities that criminals can exploit.
Microsoft recently announced its Azure Key Vault service is available for commercial use.
VMware has updated a management tool to meet emerging security standards for Docker containers.
A recent survey examining the top perceived problems with cloud adoption points to one major obstacle: security.
Developers and rogue enterprise users can cause problems.
Survey shows IT and security pros wary of potentially expensive cloud data breaches.
Due to the nature of data protection, what's right for one enterprise may not be right for yours. Here's some tips to consider when finding a solution to secure your data.
Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.
Look for these transforming trends in your network security in the coming year.
A new exploit poses as law enforcement to trap users into paying to unlock their system What you need to know about the exploit and how to keep your users safe.
We explore the best practices that address the special needs of educational institutions.
What IT should do to secure data in the cloud.
As cyber criminals get smarter and mobile malware continues to proliferate along with fraudulent devices, how can security teams effectively prepare for the sophisticated threats ahead?
Security is more than just determining which users have access to applications and data. Compliance also isn't enough. What's needed is a risk-based approach to security -- a pro-active, prevention-oriented line of attack to keep your enterprise safe.