To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time.
Late last year, documents from Edward Snowden's NSA trove have revealed that Britain's GCHQ has mounted a successful attack against Belgacom (the largest telecom in Belgium) and its subsidiary BICS (Belgacom International Carrier Services), a Global Roaming Exchange (GRX) provider.
CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, according to 360 Advanced.
Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, illustrates the way cloud enables cybercriminals to expand the scope and size of their attacks, and more.
Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to Gartner, Inc.