Posts From CCME

Today, many businesses and corporations are stuck between a legacy antivirus endpoint security solution and the path forward. These solutions tend to be highly reactive and labor-intensive. Most legacy antivirus (AV) solutions are merely signature file- or definition-based attempts to

We’re collectively creating a massive amount of data on a daily basis. In fact, according to research from tech giant IBM, our devices generate around 2.5 quintillion bytes of the stuff every day. Businesses are no different. In fact, their

Nearly three-quarters of the U.S. workforce will be mobile workers by 2023, IDC predicts. With so many employees on the road at least part of the time, being able to access business critical applications remotely is key to the way

In May of this year, organisations across the globe were hit by a malicious ransomware attack that left over 230,000 systems in a state of chaos, with hackers demanding ransom for systems to be returned to normal. With up to

BeyondTrust, the leading cyber security company dedicated to preventing privilege abuse and stopping unauthorized access, announced that for the fourth straight year, it is listed as a Representative Vendor in Gartner’s August 2017 Market Guide for Privileged Access Management (PAM).

SDN, NFV & VNF are among the alphabet soup of terms in the networking industry that have emerged in recent years. Software defined networking (SDN), network function virtualization (NFV) and the related virtual network functions (VNF) are important trends. But

We’re in an era in which pre-packaged exploit services make it possible for the average Joe, with no technological experience or prowess, to launch intricate attacks on our environments. So, what can be done? Patching operating systems and applications is

The data backup market is changing fast. Here are five vendors leading the transformation. The backup and recovery market has become a crowded space, with hundreds of vendors vying for market share. At the higher end of the market, the

As Ron Kehoe wrapped up his Data Center World session about Network Security Policy Management (NSPM) this past Wednesday, an attendee, sounding as though he had just learned about the Holy Grail of security, asked: “And, this technology is available

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify a critical vulnerability that requires a patch, they may not have the authorization to tweak the cloud provider’s pre-packaged stack.

Databases – by definition – contain data, and data such as credit card information is valuable to criminals. That means databases are an attractive target to hackers, and it’s why database security is vitally important. In this article we cover

Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*. This is the first direct competitive analysis of endpoint detection and response (EDR) vendors. The report provides an assessment of

Historically the Internet of Things (IoT) has been much more hype than substance. Sure, there have been a few verticals such as oil and gas and mining that have embraced the trend, but those vertical have been active in IoT

If you’re trying to bar the door to malware infections, automated application whitelisting is a tactic that the U.S. National Institute of Standards and Technology thinks you should try — and the agency wants to help you implement it in

DDoS are growing. Designed to take down a website or network infrastructure, they can be volumed based, where a service is swarmed with requests, or protocol request based, which use TCP/IP requests from false IP addresses to wear down resources.