Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has […]
Pinpointing the right level of security spend is easy in theory but not in practice.
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.
Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and […]
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
They may not have the scale or the reputation of big vendors, but security startups are often better positioned to meet your specific needs.
Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.
The law goes into effect in 2020, but now is a good time to start preparing.
Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.
Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.
To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors. With artificial intelligence (AI) and machine learning, this data can also be used to make predictions. Is an employee planning to steal data? To defraud the company? To engage in insider trading? To sexually harass another employee?
The volume of data traveling on networks and sophistication of attack tools are outpacing human experts’ capabilities.
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen […]