ResearchCloud second-quarter 2014: analysis and outlook
During the second quarter of 2014 we saw the rise of Docker as well as a few providers pushing harder to the cloud, the government finally beginning to make significant movement… Read more »
{"source":"http:\/\/search.gigaom.com\/technology\/cybersecurity\/wijax\/383af13036138b805db0da550b1f5914","varname":"wijax_3605091a7d93266569a745ad352e4c54","title_element":"h2","title_class":"widget-title","title_before":"%3Ch2%20class%3D%22widget-title%22%3E","title_after":"%3C%2Fh2%3E"}
During the second quarter of 2014 we saw the rise of Docker as well as a few providers pushing harder to the cloud, the government finally beginning to make significant movement… Read more »
The extent of the ongoing IT security threat continues to expand in form, scale, and response. While both threats and responses are becoming more sophisticated, so far the threats appear to… Read more »
Companies often rely on mobile-device management systems as a key element in their protection strategy. But they also need deep and broad visibility across mobile devices combined with the capability to… Read more »
Despite last week’s crackdown on Gameover Zeus perpetrators, the threat posed by attackers armed with the Zeus framework continues, according to security firm Prolexic. Read more »
For enterprise-IT practitioners and data-center operators, SDN delivers networking with the same level of flexibility and agility as virtualization has allowed them to deliver other parts of their infrastructure. Read more »
From the Federal Reserve to Target to Heartbleed, recent security breaches have proven that existing systems are inadequate. Today’s threats are persistent, adaptable, and attack across multiple vectors, rendering firewall /… Read more »
China has suspended a joint cybersecurity working group with the U.S. following the latter’s indictment of 5 Chinese army officials over hacking operations that allegedly sought to steal trade secrets and… Read more »
Thousands of websites may have inadvertently introduced the Heartbleed bug to their servers in an effort to secure themselves from the vulnerability. In today’s era of web security, it’s probably not… Read more »
As we move closer to an always-connected world, we must remember that anything connected to the Internet is vulnerable to attack. The problem may be complex, but the solutions are simple… Read more »
Facebook detailed on Tuesday a new cybersecurity framework called ThreatData. It’s a collection of systems for ingesting, analyzing and acting upon threat data that can vary greatly in both type and… Read more »