Information leakage and applications asking for too many permissions were also major issues, according to a survey of more than 3,300 popular mobile applications.
Read moreSecurity Operations in the World We Live in Now
March 25 2021Despite the challenges of remote work, security operations teams can position themselves well for the future.
Read moreCIOs must create a culture centered around cybersecurity that is easily visible and manageable.
Read moreBy being more mindful of how and where they share PII, employees will deprive cybercriminals of their most useful tool.
Read more6 Tips for Limiting Damage from Third-Party Attacks
March 25 2021The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.
Read more6 Tips for Limiting Damage from Third-Party Attacks
March 25 2021The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.
Read moreThe company believes the attack's impact is limited to its internal IT systems and corporate websites.
Read moreCalifornia State Controller’s Office Suffers Data Breach
March 24 2021Employee unwittingly gave hacker access to email account for more than a day.
Read moreCisco Talos' IR engagements found attackers relied heavily on malware like Zloader and BazarLoader to distribute ransomware in the past three months.
Read more
Recent Comments