Security

endpoint security EDR cybersecurity

Securing an Organization: Top 5 Cybersecurity Solutions for Prevention, Detection and Response

Every organization is looking for the best endpoint security—a way to protect their assets, especially with today’s rapidly changing threat landscape and increasingly regulated business environment. Getting breached has consequences not only for an organization’s customers, users and the bottom

Securing an Organization: Top 5 Cybersecurity Solutions for Prevention, Detection and Response Read More »

crystal ball 2018 cybersecurity predictions

Was The Crystal Ball Crystal Clear? Reflecting on 2018 Cybersecurity Predictions

We’re halfway through 2018 and several cybersecurity predictions made in late 2017 have, unfortunately, already come true. From cryptojackers becoming an actual threat to organizations instead of just a nuisance for end users, to hardware vulnerabilities that may even impact

Was The Crystal Ball Crystal Clear? Reflecting on 2018 Cybersecurity Predictions Read More »

Oracle Java deserialization

Will Dropping Serialization from Java Remove the Vulnerabilities?

During “Ask The Architect” at the Devoxx UK 2018 conference, Oracle’s chief architect, Mark Reinhold, called Java’s serialization mechanism a “horrible mistake” and a virtually endless source of security vulnerabilities. More importantly, Reinhold announced Oracle’s decision to improve Java’s security

Will Dropping Serialization from Java Remove the Vulnerabilities? Read More »

IoT attacks IoT security

This Isn’t a Tech Thriller: IoT Attacks Are Real

If you read enough tech thriller or science fiction books, you’re bound to be familiar with a super villain using some kind of technology to wreak havoc across the planet—often triggered by hacking critical internet-of-things (IoT) systems. But the fact

This Isn’t a Tech Thriller: IoT Attacks Are Real Read More »

Scroll to Top