2018 saw a 424% increase in data breaches due to cloud misconfigurations caused by human error. Going forward, 99 percent of all firewall breaches will be caused by misconfigurations, not flaws
The Global Policy Controller (GPC) was built onto the platform and shows the overall intent of a policy and streamlines the process of pre-compliance checks through automation without breaking security policy.
The weakest link in cybersecurity, it’s often said, is the occupant of the space between the chair and keyboard. Indeed, with phishing attacks not only still seeing widespread success but actually on the uptick, employees...
The first half of 2017 has not exactly been a ride in the park for cybersecurity professionals. Some of the highlight events so far this year have been the Shadow Brokers regularly dumping NSA hacking...
Hackers have published medical files stolen from the plastic surgery clinic Grozio Chirurgija, including (reportedly) patient photos, passport scans, insurance information and social security numbers.
While the cloud is inevitably the future home for data storage that doesn’t mean it’s perfect and those who entrust a third-party storage company to safely and competently house their data have nothing to worry...
Uber is proactively fighting phishing attacks by developing and implementing its own custom email intrusion detection systems (IDS).The ride-sharing firm announced it is deploying its own intrusion detection solutions designed to analyze payloads in sandboxes...
yber industry executives are weighing in on the presidential Commission on Enhancing National Cybersecurity's Report on Securing and Growing the Digital Economy identifying several areas they feel the commission nailed when...
Paul Calatayud has been appointed as chief technology officer at FireMon. With 16 years of experience in the security industry behind his belt, Calatayud will lead enterprise security programs to strengthen relationships and contribute real-world...