A significant cybersecurity challenge arises from managing the immense volume of data generated by numerous IT security tools, leading organizations into a reactive rather...
Red Hat Partners with SAIC to Deliver Open Source Cloud Computing Solutions for U.S. Department of DefenseThe U.S. Department of Defense will soon be...
Quarri Technologies, a firm that focuses on secure browsing sessions, has received $3M in Series B funding from the Houston Angel Network (HAN) which...
What Do 4G/LTE Networks' Entirely New Infrastructure Mean for Security?By now, we’ve all seen the uncharacteristically techie ads for 4G/LTE phones and services. Even...
SSL Renegotiation Vulnerability Exploited via New Attack Tool to Launch DoS AttacksA German hacker group has released a new proof-of-concept tool for denial of...
A recent study focused on the concerns and challenges within the IT industry revealed that enterprise-level participants lack confidence in their organization’s overall security...
Today Oracle announced that it has entered into an agreement to acquire Endeca, a provider of unstructured data management, web commerce and business intelligence...
- Getting The Most From Your SIEM Solution -A typical SIEM deployment conversation may look something like this: Vendor: Ms Customer, now that you’ve...
My previous column emphasized the most prevalent attack techniques used by hackers. By studying thse types of attacks we can enhance our solutions. Here’s...