Data protection & recovery applications

Security threats News

View All News

Security threats Get Started

Bring yourself up to speed with our introductory content

  • Four technologies that could transform information security programs

    With digital transformations underway in many industries, CIOs aren't the only ones who need to have the next big thing on their radar. What security innovations should you follow to ready your organization's information security programs?

    The internet of things is both a security threat and potentially a security boon. Big data, machine learning and a growing number of systems with pseudo artificial intelligence may help ease the workloads of security analysts. Bitcoin's distributed database technology known as blockchain can add security to a variety of systems, but scalability remains an early concern. Quantum computing? That one may be too far out -- five years at least -- to be considered a near-term technology disruptor to enterprise information security programs.

    Whether your organization is focused on manufacturing and infrastructure -- such as industrial control systems -- or consumer and information technology -- such as the internet of things -- everything is rapidly becoming connected and potentially accessible from the internet. Many information security programs are not on track for the internet of things, complex clouds and other technology disruptors. We dust off the crystal ball in this issue of Information Security magazine and ask infosec experts and venture capitalists to look into the future.

     Continue Reading

  • Internet of energy: Extracting value from data silos in utilities

    Artificial intelligence and machine learning are critical to the success of 'the internet of energy,' explains Stuart Gillen of SparkCognition. Continue Reading

  • Tornado warning: Commingling of public and IoT clouds?

    The commingling of public clouds and IoT clouds is a gamble. Fortinet's James Cabe explains how to prevent a tornado (or botnet) from ravaging IoT security. Continue Reading

View All Get Started

Evaluate Security threats Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security threats

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security threats Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve