what’s so special about a CASB: part four
Discovery Beyond Shadow IT
In Part 3 we learned about Bitglass’ unique capabilities that protect your data in real-time, end-to-end. While in-band security is critical, CASBs aim...
Russia succeeds in neutralizing cyber attacks on its banking system
Russia has made it official that it has succeeded in neutralizing a cyber attack on its financial system. The federal nation added that the...
what’s so special about a CASB: part three
In Part 1 of this series, we explored how cloud security has evolved to encompass cloud apps and unmanaged device access. In Part 2, we learned how...
5 Things Solution Providers Should Know About Googlian Malware
A Major Breach
Check Point Software Technologies Wednesday said its researchers discovered a new Android malware, called Googlian, that has breached more than a million...
HPE Aims to Shorten IoT Deployment Times, Lower Costs with MVNE
Hewlett Packard Enterprise (HPE) is aiming to bridge the divide between different Internet of Things protocols to help speed up deployment times and lower...
VOIP services are vulnerable to cyber attacks says IBM
A cyber attack alert has been issued by IBM to all those using VOIP services across the world. The computing giant has issued an...
Government agencies in Saudi Arabia hit by Shamoon Malware
Shamoon Malware has hit government agencies operating across Saudi Arabia in November this year. This was revealed in a report prepared by US security...
Cyber attack on TalkTalk and Post Office Broadband routers
BBC has confirmed in an early morning report of today that TalkTalk and Post Office Broadband routers were hit by Mirai malware on the...
what’s so special about a CASB: part two
In Part 1, we saw the need for security systems to evolve in order to meet an ever growing trend of work and data going...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...