Remote connectivity services provider LogMeIn announced the acquisition of Meldium, a startup that specializes in cloud-based single-sign-on (SSO), password management, and identity and access management (IAM) solutions.
The use of virtualized systems in a enterprise environments can provide many benefits, but these systems need some special attention paid to security, Symantec said in a new report examining threats to virtual environments.
Hypervisors have become an important part of enterprise environments and while they should normally reduce the attack surface, experts warn that they can be plagued by security vulnerabilities that could be leveraged by malicious actors.
The security teams at Drupal and WordPress have fixed a remotely exploitable a denial-of-service (DoS) vulnerability in PHP XML parsing that affects tens of millions of websites that use their publishing platforms.
To protect sensitive data from prying eyes, some organizations are turning to Bring-Your-Own-Encryption (BYOE), but experts warn that there are some aspects that need to be take into consideration before making the move.
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
The smallest Amazon customer benefits from the demands being met for the largest Amazon customers. However, after you get a shiny new instance on Amazon, it’s still up to you to secure the software stack on that instance.
While traditional hosting services have evolved away from bare metal to form IaaS, and generally up the stack to PaaS, including security as part of the service will change as security gets baked-in closer to the infrastructure.