IBM recently announced a software-oriented solution to help eradicate attacks by return-oriented programming (ROP) malware. ROP malware is a significant and growing problem in the industry. Crafty hackers will use snippets of code from other trusted programs and stitch them together to create their attacks. This method has become a very popular and effective technique for […]

Ask your colleagues whether cloud security is the same as or different from traditional data center security; some will say it’s the same, while others will say it’s different. The correct answer, of course, is “yes.” There are probably as many similarities as there are differences between cloud and classic data center security models. Depending […]

Analytics, big data, automation, and machine learning are all terms we use when talking about the future of cybersecurity. As the volume of security data increases, data science will become an important weapon to disrupt adversaries. Too often, these terms are used as synonyms, but they refer to different parts of the domain of data […]

Have you downloaded the new iOS10 on your iPhone? If you have, you might have noticed a new app called ‘My Home’ which allows you to “build your connected home by adding lights, locks, thermostats and other HomeKit-enabled accessories.” This is the latest step in the world of the Internet of Things and interconnected smart […]

Who doesn’t love larger-than-life characters? Celebrities fascinate us. From laughter to tears, their performances stay in our memories, sometimes even in the form of hilarious internet memes. Unfortunately, however, all this attention also piques the interest of another group: cybercriminals. Since celebrity curiosities account for so much internet traffic, crooks see celebs as a chance […]