Although some global payment organizations apparently have failed to meet the Bank of India's October 15 deadline for storing all Indians' payment data domestically, the nation's central bank reportedly has ruled out extending the deadline and is demanding a status report.
Security is a journey not a destination. What's been deployed today may be found
to have a vulnerability tomorrow. Operating systems like Windows Server 2003 and
2008, which were once trusted building blocks for critical applications, are now
potential liabilities as time goes on and maintenance comes to an end and...
Deep learning opens up new worlds of possibility in AI, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up.
Read this MIT Technology Review custom paper to learn how advanced AI...
Although the government has been slower than the private sector to adopt the cloud, there's no doubt that the shift is underway. IDC says "Cloud First" will become the new mantra for enterprise IT, noting that the major innovations taking place in IT today are not possible without the cloud as a foundation.
A computer security researcher has discovered a vast marketing database containing 340 million records on U.S. consumers. The database is the latest in a long line of databases to have been left exposed to the internet without authentication, thus putting people's personal data at risk.
While some payment companies are strongly protesting the Reserve Bank of India's mandate that they store all data locally by October 15, portraying compliance as costly and impractical, others support the move as a way to ensure data is protected.
In a reversal, chipmaker AMD is now warning that its chips are susceptible to the speculative execution flaws in microprocessors known as Spectre, but not to the Meltdown. Separately, Intel has confirmed that its firmware updates have led to stability problems for older Broadwell and Haswell processors.
Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR once enforcement of the data protection law begins later this year.
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Traditional perimeter-centric data center security strategies are no longer effective against today's malicious and highly sophisticated attacks. While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, until recently, nothing resembling that same level of thought...
Hardware-centric networks are not able to keep up with the demands of business today, not to mention the growing security threats that exist. Read this solution overview to discover how implementing a network virtualization solution for your business will make your life easier.
Enable networking and security at...
IBM and Lenovo have issued a security alert, warning that they inadvertently shipped malware-infected USB flash drives to some customers who use their Storwize hardware. The malware, known as Reconyc, is designed to install additional attack code on infected endpoints.
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
Securing your data centers, edge, and cloud environments is an ongoing challenge as threat landscapes continue to evolve. Traditional firewalls are no longer sufficient. What's needed is a firewall that can adapt to emerging threats in near real time, in an automated and dynamic way.
This white paper discusses the...