New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.
Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.
Network security is an around-the-clock battle. Agency cybersecurity teams are left with skeleton staff, and many furloughed security experts may not come back.
“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.
Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.
Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.
The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption.
Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.
New tools put more power in the hands of security professionals, whose responsibilities have grown exponentially.
Pinpointing the right level of security spend is easy in theory but not in practice.
Researchers agree that most enterprise security breaches involve stolen or weak passwords. Here are the main technological approaches to addressing this problem.
Amazon is responsible for securing its cloud. Your security inside its cloud is on you.
They may not have the scale or the reputation of big vendors, but security startups are often better positioned to meet your specific needs.
The law goes into effect in 2020, but now is a good time to start preparing.
Supercomputers are evolving at a maddening pace, but no matter how powerful, they remain impractical for solving security challenges.