Leading this week's industry news roundup, FireEye Inc. announced the rollout of FireEye OS 7.1., an update to the FireEye OS. See additional news from Arbor Networks, HID Global and more.
Can roaming services be used successfully as a backup for mobile networks that fail? It's a new idea being explored by the European Network and Information Security Agency. What are the pros and cons?
It's been three weeks since the start of Phase 4 DDoS attacks on banks. But so far the impact has been minor. Are attacks over or yet to come? Rodney Joffe and other DDoS experts share theories.
DDoS attacks launched by hacktivists are often viewed as little more than an interruption to online services. But Terry Ray of Imperva highlights a greater worry hidden behind these attacks.
Izz ad-Din al-Qassam Cyber Fighters' attacks on U.S. banks are back, and strikes waged July 31, without a doubt, prove it, says Akamai's Mike Smith. So why are security experts so puzzled by recent DDoS events?
What top mobile security concerns should organizations be considering? As more devices connect to the enterprise, Akamai's Fran Trentley says there are certain priorities businesses must prepare to address.
Distributed-denial-of-service attacks are perfect weapons for cybercriminals and political adversaries, says Prolexic's Scott Hammack, who explains why any organization with an online presence should brace itself for attacks.
The implementation of IPv6, the new Internet communications protocol, will have a major impact on identity and access management. EMC researcher Davi Ottenheimer explains how organizations should prepare.
On average, 86 percent of web applications have at least one serious vulnerability, and each app is attacked about 4,000 times per year, says Imperva's Terry Ray. So, how must security be improved?
DDoS experts say three online game sites have been hit by Brobot, the massive botnet that since mid-September has been used by hacktivists to attack leading U.S. banks. What do these attacks signal?
Hacktivists have formally launched their third wave of distributed-denial-of-service attacks on U.S. banking institutions, and their botnet is growing. How should institutions prepare to defend?
Data security used to be about building firewalls and protections around the data. Now it's about securing the data itself. That's why data is the new perimeter, says Charlie Pulfer of Titus.
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
Combining a network access control system with a mobile device management system is a good way to address security for BYOD, says Scott Gordon of ForeScout.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.