Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.
Read moreRansomware from Your Lawyer’s Perspective
June 16 2020Three good reasons why your incident response team's first call after a data breach should be to outside counsel.
Read moreThis step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.
Read moreTwo security vulnerabilities could open up companies to financial attacks and compliance violations if the software is not updated, Onapsis says.
Read moreThe demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.
Read moreRyuk Continues to Dominate Ransomware Response Cases
June 15 2020Analysis reveals how Ryuk's operators are changing their techniques and using new means to break in.
Read moreA bloody pig mask, doxing threats, and a foiled surveillance attempt were among the actions six ex-eBay employees took against an editor and publisher of a newsletter.
Read moreNew control-flow enforcement technology will become available with upcoming Tiger Lake mobile processor, chipmaker says.
Read moreMicrosoft Releases Update for DoS Flaw in .NET Core
June 15 2020Customers are advised to install the latest version of PowerShell to fully address CVE-2020-1108.
Read more
Recent Comments