How New Technologies Are Providing New Openings for Hackers

The evolution of cloud and mobile technologies, along with the growing number of internet-connected devices, is presenting new opportunities for hackers and new cybersecurity challenges for businesses. Two cybersecurity executives—John Hering, the co-founder and executive chairman of Lookout Inc., and Andrew Rubin, co-founder and chief executive of Illumio—sat down with…

read more

Collaboration Key for Cloud Communications Security

Enterprises must work hand in hand with UCaaS providers to ensure strong end-to-end security of communications delivered from the cloud. It’s no secret that companies continue to move their enterprise communications — including phone and collaborative messaging applications — to the cloud at a rapid clip. The speed of business…

read more

Skyhigh Networks Announces Industry’s First Cloud Security Solution for Custom Applications and Infrastructure-as-a-Service Platforms

-Skyhigh Networks, the world’s leading Cloud Access Security Broker (CASB), today unveiled the industry’s first comprehensive security, compliance and governance solution for custom applications and infrastructure-as-a-service (IaaS) platforms like the Amazon Web Services (AWS) Cloud, Microsoft Azure and Google Cloud Platform. As businesses embrace the move to public cloud environments,…

read more

Yes, pacemakers can get hacked

Here’s a heart-stopping cyber-threat: Your pacemaker could get hacked. The Food and Drug Administration this week published guidelines to help medical manufacturers prevent hackers from breaking into implantable devices that operate with the help of cloud-based networks. Those include pacemakers, defibrillators and insulin pumps, whose manufacturers increasingly are loading them…

read more

Computer hackers take to the cloud

In recent years, computing has gone to the cloud. But this so-called “cloud computing” can pose new risks, a study finds. The reason: Computers that make up the cloud have become a hideout for malware, programs that can hijack or harm someone’s computer or files. People use “cloud computing” to…

read more

Hackers love the Cloud

Businesses and financial institutions store all sorts of sensitive customer data in the Cloud, including email addresses, Social Security numbers, and bank account log-ins by the millions. This makes the Cloud a potentially rich hunting ground for hackers. Jim Barry, digital answer man for the Consumer Technology Association, explains the…

read more