Software Vulnerabilities September 10, 2015 The Security and Privacy of Wearable Health and Fitness Devices 4 min read - Health and fitness devices that are connected to the Internet of Things can improve quality of life, but they also have security and privacy risks.
X-Force September 4, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part III 3 min read - In the final installment of this series, we focus on S$A attacks as well as some ways your organization can prevent side-channel attacks on its VMs.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
August 27, 2015 Just 1 Percent of Enterprise Employees Pose the Biggest Cloud Security Risk 2 min read - Recent research has revealed that just 1 percent of enterprise employees pose up to 75 percent of cloud security risk due to a lack of user education.
Cloud Security August 21, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part I 4 min read - This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
August 7, 2015 Are Cloud File Sync Tools Out of Step With Security? 2 min read - File sync services are now at risk of man-in-the-cloud (MitC) attacks, putting critical information at risk. What's the threat level for corporate data?
August 5, 2015 Why Banks Are Turning to Tokenization to Protect Cloud Data 2 min read - A research report showed tokenization is gaining traction with banks that have begun to store highly sensitive information in the cloud.
Cloud Security July 29, 2015 Health Care Data Breaches and the Cloud: Trick or Treat? 3 min read - Cloud security solutions may be the answer for health care organizations seeking to secure data, but they don't come without risks.
July 23, 2015 About 30,000 Instances of MongoDB Exposed on Web, Security Researcher Says 2 min read - Some 30,000 instances of MongoDB are accessible over the Internet because of a failure by database administrators to properly configure them.
CISO July 8, 2015 Looking Ahead: CISO Strategies for 2020 3 min read - Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.