A U.S. grand jury has taken the extraordinary step of indicting 13 Russian nationals and three Russian companies for allegedly interfering with the U.S. political system, including the 2016 presidential election, in what the Justice Department portrays as "information warfare against the United States."
After a year of brainstorming on blockchain technology, Microsoft says it will add support in its Authenticator app for a decentralized identity system that's designed to put users in control of their personal information.
To support a dynamic workforce in the era of consumerization, IT organizations need to move from the traditional desktop model to new, more fluid digital workspaces that are tuned for mobility, a workforce using new devices, and the agile delivery of new apps. The virtualization of Windows desktops and apps is one of...
The consumerization of the enterprise represents both a challenge and an opportunity for IT. Implementing a digital workspace solution can help IT harness the rapid changes brought about by consumerization and address the needs of the full range of users and use cases within the business.
Download this whitepaper...
Shadow IT leads to blind IT. As IT has no way to measure costs or manage security, they start using probes to pull information. Those probes are good and should be used to catch exceptions, but they are not designed to catch every possible app at all given times. Instead, a strategic platform is needed to audit access...
Attackers recently snuck cryptomining code onto thousands of websites by inserting it into a third-party accessibility plug-in called Browsealoud. Web specifications designed to guard against these types of rogue actions by third-party code libraries already exist. Why aren't more sites using them?
As internet of things devices become increasingly common in the enterprise, CISOs must lead the way in making sure emerging security issues, including a higher risk of distributed denial-of-service attacks, are adequately addressed, says John Pescatore of the SANS Institute, which offers training for CISOs and others.
For organizations that are embracing cloud and virtualized environments, three common-sense steps are proving to be key for providing the visibility and control needed to maximize security across modern IT environments.
Download this eBook to learn how you can implement these steps in your organization.
Today, application infrastructure is divided between on-premises data centers, clouds, and distributed applications that leverage microservices. To keep everything safe, organizations need a unified solution that offers visibility and control - and perimeter-centric network security can't provide that.
As we've already seen - even with IT security spending topping $80 billion in 2016 alone - the old approach to IT security isn't sufficient to stem the rising threat levels.
Download this eBook to learn five considerations to help you rethink your approach to IT security.
VMware and Intel transform security by...
In an exclusive, in-depth analysis, a panel of security experts concludes that India's recent Aadhaar data security conundrum, resulting in identity theft and data breaches, was due to poor implementation of security, monitoring and authentication mechanisms.
Following the online attack against the opening ceremonies of the Olympic Winter Games in South Korea, some pundits were quick to guess that Russia was involved. But some attribution experts call the rush to attribute any cyberattack premature or even "irresponsible."
Hackers crashed the Winter Olympics, apparently by using destructive malware dubbed "Olympic Destroyer." The attack resulted in the Pyeonchang 2018 website being offline for 12 hours and WiFi unavailable during the opening ceremony, but organizers say no competitions were disrupted.
More than 4,200 websites, some belonging to the U.S., U.K. and Australian governments, have been turning their visitors' computers into mining machines to harvest the virtual currency Monero. The security lapse continues the recent trend of cryptocurrency mining malware overtaking ransomware.
Illegal transactions on the internet have long been conducted in the cryptocurrency bitcoin. But underground vendors are accepting new kinds of virtual currency that may be safer to store and offer more privacy protections, according to a new study of 150 dark web markets and forums.