Visibility into and inspection of inbound encrypted network traffic is essential for sound enterprise network security. Decryption approaches must soon change due to increasing cost and complexity, but alternative...
Read moreChina, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.
Read moreThe State of Hacktivism in 2020
July 21 2020Activism via hacking might not be as noisy as it once was, but it hasn't been silenced yet.
Read moreUS Indicts 2 Chinese Nationals for Stealing IP & Business Secrets, Including COVID-19 Research
July 21 2020Pair working on behalf of themselves and China's Ministry of State Security, Justice Department says.
Read moreUpdates built for remote employees include an endpoint data loss prevention platform, insider risk management, and double key encryption.
Read moreFortinet Buys Cloud Security Firm OPAQ
July 21 2020The company plans to add zero-trust networking capabilities to its Secure Access Service Edge architecture.
Read moreWhy knowledge-based authentication is leaving federal contact centers vulnerable to an increasingly sophisticated hacker community.
Read moreNew security features include support for a new standard in Gmail, phishing protection in Chat, and additional admin controls.
Read moreHaving a strong Dark Web intelligence posture helps security teams understand emerging vulnerability trends.
Read more
Recent Comments