Last year was a record year when it came to attendance for the RSA Conference. More than 40,000 attendees arrived at the Moscone Center to learn about and discuss the latest in cybersecurity trends ranging from cybersecurity big data analytics, application security, to forensics and incident response and everything in-between.
All about Virtualization and Cloud Security | Recent Articles:
This year’s leading security conference, RSA, takes place February 13-17 in San Francisco, California, where the world’s best security researchers will present the findings of their latest research against cybercrime.
Eighty nine percent of organizations do not evaluate the financial impact of every significant breach and, of those that have suffered a cyber incident in the last year, nearly half have no idea what the financial damage is or could be, according to research by EY.
Fake news has been in the headlines a lot lately, after becoming a major topic of discussion during the recent U.S. presidential election. What many people might not realize—and what IT and security executives need to think about—is the security implications of fake news sites.
It turns out that story about guests being locked out of, and locked into, their hotel rooms in a four-star hotel in Austria aren’t exactly accurate. According to this story in The Verge, Don’t believe the story about hackers locking guests in their rooms at a luxury hotel while what happened is still very interesting, and of concern to any traveler, what was reported wasn’t entirely accurate.
Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there.
From 1960s mainframes to today’s datacenters, computing has changed drastically, in both hardware and software. Today’s converged infrastructures bring together hardware and software to redefine how we operated, helping businesses to cut costs while maintaining availability and performance.
A warning has been issued that companies who have installed the popular Cisco WebEx extension on Chrome could have opened themselves up to malicious attacks.
Not too long ago, most people probably couldn’t imagine their automobiles being vulnerable to cyber security threats such as hacking. But with the rapid growth of connected objects of all types as part of the Internet of Things (IoT)—including vehicles—these concerns have become a distinct possibility.
Some 20 percent of organizations will use smartphones instead of physical access cards by 2020, according to a report by advisory company Gartner.
Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here.
A recent report by the Institute for Critical Infrastructure Technology (ICIT), a cyber security think tank that acts as a conduit between the private sector, U.S. federal agencies and the legislative community, paints a frightening picture of the information security landscape.