Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, […]
Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes […]
Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers […]
It happens in every company. Employees find a cool new online service that makes them more productive. They create free […]
Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, anti-virus tools still play […]
“We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown […]
People expect their email to be private between them and the recipient, but in reality, the contents of your email […]
In June, South Korean hosting company Internet Nayana, Inc., was hit by a ransomware attack that took down its 153 Linux web […]
The cybersecurity talent shortage keeps getting worse. According to Cybersecurity Ventures, the cost of cybercrime will double from $3 trillion […]
Sonatype’s crown jewel is its database of descriptions of over 1.2 million open source packages. “If that is lost, it […]
The Office of Personnel Management breach in June 2015 was a big wake up call to our federal government, and, […]
Everybody knows and hates whitelisting. Employees are only allowed to install approved software on their desktops and laptops, so they’re […]