It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.
- Chrome versus IE and Edge: which is more secure for enterprise?
- Hackers plant malware in popular CCleaner
- Hackers infected official CCleaner downloads with malware for a month
- The week in security: Data breaches are pushing down victims’ share prices
- EU picks agency to lead IoT security labelling efforts