Fortinet has rolled out a new version of its FortiOS operating system that gives customers the ability to manage security capabilities across their cloud assets and software-defined wide area networking (SD-WAN) environments.
Stories by Tim Greene
SlashNext, a startup formed by a former FireEye engineer, uses machine learning and artificial intelligence to detect and prevent threats from causing harm.
A cycle of increasing new malware is well underway and could last the rest of this year if a trend established over the past two years continues.
Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity.
McAfee has officially spun out from Intel, dumping the name Intel Security and under new majority ownership that has deep pockets to help the company more aggressively acquire technology via mergers and acquisitions to supplement its home-grown innovations.
Users of Azure cloud services have a new option for stopping the misuse of privileges as well as managing vulnerabilities through an alliance with Beyond Trust.
More and more attackers are carrying out their work without using malware so they can evade detection by traditional, file-based security platforms, which presents a tough problem for security pros trying to defend against them.
The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other personal information.
Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.
When ransomware criminals lock up files and demand payment to decrypt them, don’t pay but be prepared with backup.
If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.
An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.
Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.
Pwnie Express is adding a tool called Device Risk Scorecard to its Pulse Serivce that ranks the risks its security service finds on customer networks and makes it easier to remediate them.
Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get.