It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.
Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.
Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.
The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.
The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here’s how it works and what you can do to mitigate its risk.
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.
Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and cyber criminals.
In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just part of the answer, however.
Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.
Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.
Moving data and processes to the cloud presents challenges for enterprise SOCs. Here’s how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data.
Newer isn’t always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.
Lockheed Martin’s cyber kill chain approach breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.