Support Login
 

security Tag

Use Cases: Securing Applications and Data

19:23 22 May in Attivo News
0 Comments

We asked 25 security professionals to provide us with some examples of use cases where they are helping clients secure applications and data. Here's what they told us:Securing Apps/Devices/APIs/IoT1) We ensure apps that manage valuable data (personally identifiable information, healthcare data) are secure. We see...

Hackers Ran Through Holes in Swift’s Network

14:27 01 May in Industry News
0 Comments

The Society for Worldwide Interbank Financial Telecommunication has James Bond-level security at the facilities it uses to move millions of bank-payment orders around the world every day.Visitors to a Swift operations center in Culpeper, Va., say their car trunks were inspected upon arrival by armed...

Major security predictions for 2016

10:36 29 January in Research
0 Comments

If a week is a long time in politics, as former British Prime Minister Harold Wilson observed, a year in cybersecurity can seem like an eternity. But despite the rapid changes, many things remain constant. Check Point’s top three predicted security threats for 2015 were...

How Hackers Took Down a Power Grid

12:00 26 January in Industry News
0 Comments

It was an unseasonably warm afternoon in Ukraine on Dec. 23 when the power suddenly went out for thousands of people in the capital, Kiev, and western parts of the country. While technicians struggled for several hours to turn the lights back on, frustrated customers...