Day: March 10, 2017

IDG Contributor Network: Mobile devices: The 'last mile' to enterprise biometrics

Authenticating who is truly behind any action, whether it’s logging into Twitter or accessing a bank account, is the biggest challenge in security today. At the enterprise level, this reality is infinitely more critical: businesses need to completely secure access to their systems and data, and be certain that only those who are granted access

0Shares
Read More
Latest Intelligence for February 2017

Number of new malware variants reaches highest level since October 2016 and Symantec uncovers a wider campaign carried out by Shamoon attackers. Publish to Facebook:  No Twitter Card Style:  summary Some of the key takeaways from February’s Latest Intelligence, and the threat landscape in general, include the highest increase in malware variants since October 2016,

0Shares
Read More
WikiLeaks will share CIA hacking details with companies, but can they use it?

WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed. But will software companies want it? [ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld’s Security Report newsletter. ] The information WikiLeaks plans to share comes

0Shares
Read More
Google tries to beat AWS at cloud security

Google knows that if enterprises are going to move their critical services to its cloud, then it has to offer something that AWS doesn’t. At Google Cloud Next, the company’s leadership made the case that Google Cloud was the most secure cloud. At the conference this week, Google unveiled tools that would let IT teams

0Shares
Read More
Hacktivist or script kiddy? Know your 10 types of hacker

Different shapes and sizes Image by Thinkstock Hackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you identify the attackers you are most susceptible to and properly defend yourself and

0Shares
Read More