Aug 15, 2018
Software as a service (SaaS) is growing rapidly as more customers transition to use cloud-based applications. Rapidly scaling SaaS workloads, without the proper policies in place, can open expose your environments, potentially yielding new attack...
Aug 15, 2018
Software as a service (SaaS) approaches are becoming increasingly popular as organizations transition to cloud-based applications. As companies continue to scale, they often seek methods for rapidly scaling their SaaS workloads. When doing so...
Regulators are signaling they may ask banks to standardize the way they disclose cyberattacks to consumers, said James Chappell, a co-founder and chief intelligence and innovation officer at Digital Shadows, a London-based cyber-defense firm.
There are three more Meltdown/Spectre-type Intel chip exploits. The vulnerability affects Intel's desktop, workstation, and server CPUs. Particularly affected by the latest Intel chip exploits revealed might be IT shops running containers and...
At Black Hat USA, leaders at McAfee and Google stressed the importance of dialogue in addressing IoT cybersecurity.
Vendor ecosystems offer both system refurb and data destruction services that can help companies meet compliance and security concerns.
Google’s smartphone services store users’ locations even when privacy settings are adjusted to shut these features off, according to a new report by the Associated Press.