Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.
Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and […]
Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.
Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.
To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors. With artificial intelligence (AI) and machine learning, this data can also be used to make predictions. Is an employee planning to steal data? To defraud the company? To engage in insider trading? To sexually harass another employee?
First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen […]
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Network engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, […]
Experts warn of blockchain security risks in non-cryptocurrency use cases.
Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.
Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.