Security researchers discuss attackers' evolving methodologies in business email compromise and phishing campaigns.
Read moreHow to Get Employees to Care About Security
May 18 2021Want to a security awareness program that sticks? Make it fun and personal, and offer free lunch.
Read moreSplunk to Acquire TruStar for Data Management
May 18 2021Splunk said it will integrate TruStar's data-sharing capabilities into its Data-to-Everything platform following the acquisition.
Read moreFBI’s IC3 Logs 1M Complaints in 14 Months
May 18 2021The FBI's IC3 reportsCOVID-related scams and an increase in online retail may be behind the upswing in complaints.
Read moreWhy Anti-Phishing Training Isn’t Enough
May 18 2021Not only is relying on employees' awareness insufficient to prevent sophisticated social engineering attacks, some training methods can create other problems.
Read moreBest 11 Quotes From Cryptographers Panel
May 18 2021Cryptographers at an RSA Conference panel aren't worried about adversarial quantum cryptography. Machine learning, though, causes pressing practical issues.
Read moreSmall amounts of data could be sent from nearly anywhere using Apple's "Find My" network, hidden in the large volume of traffic as AirTags become widely used, two researchers...
Read moreHow to Mitigate Against Domain Credential Theft
May 18 2021Attackers routinely reuse stolen domain credentials. Here are some ways to thwart their access.
Read moreExecutives from Cisco share insights on the networking giant's ambitious security strategy.
Read more
Recent Comments