Old data may not be of much value to a business, but it can command top bitcoin on the dark web.
Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security.
The vulnerability is a reminder that apps on your employee’s phones represent a huge attack surface for your enterprise network.
California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
Experts warn that BlueKeep attacks are on their way, and at least a million machines are vulnerable.
It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.
Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.
Recent studies and surveys indicate that improperly configured public cloud instances continue to turn sensitive data into low hanging fruit.
As more data center managers move to private, public, and hybrid cloud infrastructures, new security challenges emerge, but clouds also offer new technologies to help meet security challenges.
Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.
Here are the most common types of attack that bring down data centers.
The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.
In the AI-fueled security wars, most of the arsenal is currently in the hands of the good guys, but the balance of power might soon change.
Micro-segmentation company Guardicore raised $60 million this week, but it’s not alone.
Experts say exploits would be sophisticated and take a long time to build, but operators should act now.