As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, […]
Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.
Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has […]
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.
Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and […]
Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.
Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.
To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors. With artificial intelligence (AI) and machine learning, this data can also be used to make predictions. Is an employee planning to steal data? To defraud the company? To engage in insider trading? To sexually harass another employee?
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen […]
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Network engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, […]
Experts warn of blockchain security risks in non-cryptocurrency use cases.
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?