cybercrime

cybercrime news search results

Developer news items we found relating to cybercrime

15 results
To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


Experience-Center-worldwide-launches-from-Microsoft

Experience Center worldwide launches from Microsoft


Monday, November 18, 2019 by

Microsoft has also reimagined the future of work by creating a blueprint for productivity, efficiency, accessibility, flexibility, and collaboration for organizations in the region. In a world where we can expect more than 40 billion devices generating nearly 80 zettabytes (ZB) of data by 2025, organizations and industries will need to quickly adopt new tec...


National-Coding-Week-is-here

National Coding Week is here


Monday, September 17, 2018 by

National Coding Week is upon us. That's why we thought it would be great to compile some quotes from industry experts to talk about what they think is most important about learning how to coding - a question seen through many different lenses. “Today, software drives business. So, if an organization wants to excel, it needs to become a software-powered jugg...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


IBM-Watson-for-cyber-security-has-cognitive-skills

IBM Watson for cyber security has cognitive skills


Monday, February 13, 2017 by

According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...


PMR

PMR's report on the global SecurityasaService market


Monday, December 19, 2016 by

Adopting the business model of Security-as-a-Service (SaaS) has become a pragmatic choice for companies looking at integrating security with their business infrastructure. Furthermore, emerging technological trends related to the Internet of Things (IoT) and cloud-computing will continue to compel more businesses towards implementation of a Security-as-a-Service busines...


What-an-advanced-threat-approach-for-cloud-security-must-address

What an advanced threat approach for cloud security must address


Wednesday, December 14, 2016 by

Headlines about hacking and malware prove that traditional security methods are not up to the task of protecting organizational infrastructures and data from theft and ransomware. As more organizations embrace cloud-first platforms for everything from customer relationship management (CRM) to enterprise resource planning (ERP) platforms and beyond, they place themselves...


How-do-we-simplify-eastwest-security-The-imperative-path-is-upon-us

How do we simplify eastwest security The imperative path is upon us


Monday, December 5, 2016 by

Ahhh, the endless saga of streamlining hazards around application security: let’s talk about the East-West component of the conundrum. But first, it’s important to clarify the variances of ‘East-West’ vs. ‘North-South’ traffic in a typical data center environment. By definition: North-South traffic is the communication that occurs between server applications deploy...


New-Security-Report-2016-shows-64-percent-of-millennials-experienced-a-comprised-account-hack

New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack


Thursday, November 17, 2016 by

TeleSign has released its Consumer Account Security Report 2016, providing insight into consumer sentiments on online security and the value they place on their digital lives. Of the 1,300 U.S. consumers surveyed, nearly a third report the value of their online life at $100,000 to priceless. Further, more than half of the respondents surveyed (55 percent) place the onus...


How-Governments-Open-Sourcing-Code-Helps-Us-Be-More-Secure

How Governments Open Sourcing Code Helps Us Be More Secure


Friday, August 12, 2016 by

The idea of governments releasing their proprietary code isn’t some pipe dream, it’s slowly becoming a reality in many countries and starting a much needed public discussion in others. Governments around the world are beginning to understand that their software is funded by the public, and therefore belongs to the public and should be accessible for their use. Bulgaria ...


Why-Every-DevOps-Practice-Needs-NextGeneration-Data-Security

Why Every DevOps Practice Needs NextGeneration Data Security


Monday, June 27, 2016 by

As engineers and managers, we live in a world of tradeoffs. A fast solution is usually a sloppy one; a cheap solution is often a fragile one. Any solution that breaks these tradeoffs is extraordinary. A major one can bring about a revolution. The DevOps transformation is just such a revolution. It offers orders-of-magnitude acceleration in software delivery, while ...


Security-Startup-Provider-buguroo-Launches-New-Threat-Intelligence-Platform

Security Startup Provider buguroo Launches New Threat Intelligence Platform


Wednesday, February 17, 2016 by

Security provider buguroo, a U.S. startup and spinoff of Deloitte’s European Security Operations Center (SOC), is launching bugThreats, a threat intelligence platform (TIP) that looks outside the enterprise infrastructure and focuses on useful intelligence gathered where the compromised end users, and their stolen data, are.Focused on intelligence and not protection, bu...


New-Report-Highlights-Wide-Ranging-Cybersecurity-Challenges

New Report Highlights Wide Ranging Cybersecurity Challenges


Wednesday, September 2, 2015 by

Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...