The number of organizations unprepared for cyber-attacks rose year over year

To anyone who has been paying attention, this isn’t as much of a surprise, as it is a confirmation of the ongoing tenuous condition of enterprise cybersecurity but a just-released survey from specialty insurer Hiscox shows that roughly three… Continue reading The number of organizations unprepared for cyber-attacks rose year over year

US Commerce on Security and Market Incentives — Consumers don’t want security

In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t wid… Continue reading US Commerce on Security and Market Incentives — Consumers don’t want security

US Commerce on Security and Market Incentives — Consumers don’t want security

In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t wid… Continue reading US Commerce on Security and Market Incentives — Consumers don’t want security

Get more value from your threat intelligence

Many cybersecurity organizations are of the opinion that threat intelligence can prevent, or if not prevent entirely at least lessen, the impact of successful breaches.
The post Get more value from your threat intelligence appeared first on Securi… Continue reading Get more value from your threat intelligence

Five keys to consider when it comes to securing containers

Software containers are among the hottest aspects of enterprise technology right now. Sure, containers help enterprises save budget through, just like virtualization, the improvement of hardware density. But that’s not really why enterprises are turning to containerization. It’s how application containers bring to modern cloud environments improved manageability and the ability to deploy applications as discrete functions that can be used at will and reused elsewhere in the environment, wherever needed, as a service.

The post Five keys to consider when it comes to securing containers appeared first on Security Boulevard.

Continue reading Five keys to consider when it comes to securing containers