New law on the books in Ohio protects firms that have suffered cyberattacks from being sued if they follow best practices.
Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.
Cybercrime is getting cheaper and easier, and more players are getting into the business, while enterprise attack surface is growing.
Network security is an around-the-clock battle. Agency cybersecurity teams are left with skeleton staff, and many furloughed security experts may not come back.
Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.
“Quantum-proof” encryption algorithms won’t be entirely quantum-proof. Quantum key distribution networks could be the answer.
Moving data and processes to the cloud presents challenges for enterprise SOCs. Here’s how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data.
Private-sector cybersecurity professionals say failure to follow basic security guidelines greatly weakens national security.
Newer isn’t always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.
Servers hijacked for cryptocurrency mining may lead to higher bills from your cloud provider or your power utility.
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.
The technology holds a lot of promise for security, but there’s still a long way to go before it sees serious enterprise adoption.
Most downtime incidents in the past year resulted from known causes and were preventable via robust design and processes.
Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.
Lockheed Martin’s cyber kill chain approach breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.