Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.
Read moreRansomware from Your Lawyer’s Perspective
June 16 2020Three good reasons why your incident response team's first call after a data breach should be to outside counsel.
Read moreMore bad news for cybercrooks... we hope.
Read moreThis step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.
Read moreTwo security vulnerabilities could open up companies to financial attacks and compliance violations if the software is not updated, Onapsis says.
Read moreNew research is able to recover sound waves in a room by observing minute changes in the room's light bulbs. This technique works from a distance, even from a...
Read moreHackers affiliating themselves with the hacktivist label have joined the Black Lives Matter backlash after a fatal police shooting on Friday.
Read moreThe demand for Internet of Things security practices that protect sensitive medical equipment and data will double within the next five years. Here's why.
Read moreResearchers have developed an ingenious way to eavesdrop from a distance without relying on planted bugs: they just stare at a light bulb.
Read moreRyuk Continues to Dominate Ransomware Response Cases
June 15 2020Analysis reveals how Ryuk's operators are changing their techniques and using new means to break in.
Read more
Recent Comments