How to recruit, retrain, and retain with creativity and discipline. As threats escalate and enterprise cybersecurity teams struggle to build teams that can handle mounting volumes of work, the...
Read moreSecurity Technology Cannot Stop All Attacks
July 2 2018A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply...
Read moreRedefining Security with Blockchain
July 2 2018Blockchain offers a proactive approach to secure a new generation of digital platforms and services for both enterprises and individuals. As the computing environment becomes more open and diverse,...
Read moreTicketmaster UK Warns Thousands of Data Breach
July 1 2018Customers who bought tickets through the site are advised to check for fraudulent transactions with Uber, Netflix, and Xendpay. Ticketmaster UK has notified tens of thousands of customers that...
Read moreAnalyzed cards, mainly from smartphones and tablets, contained private personal information, business documentation, audio, video, and photos. Wipe your device, then check it twice: A new study has found...
Read moreThe 6 Worst Insider Attacks of 2018
July 1 2018Stalkers, fraudsters, saboteurs, and all nature of malicious insiders have put the hurt on some very high-profile employers. Image Source: Adobe Stock (Andrea Danti) If recent statistics are any...
Read moreAdidas US Website Hit by Data Breach
June 30 2018The athletic apparel firm was hacked and data on potentially ‘millions’ of customers now at risk. Adidas is the latest retailer to get hit with a data breach: the...
Read moreWhy Sharing Intelligence Makes Everyone Safer
June 30 2018Security teams must expand strategies to go beyond simply identifying details tied to a specific threat to include context and information about attack methodologies. Cybersecurity is sometimes viewed as...
Read moreNatural Language Processing Fights Social Engineers
June 30 2018Instead of trying to detect social engineering attacks based on a subject line or URL, a new tool conducts semantic analysis of text to determine malicious intent. Social engineering...
Read moreSudhakar Reddy Bonthu used insider information about the company’s 2017 data breach to profit in stock transaction. Fallout from the epic Equifax data breach just keeps coming: A second...
Read more
Recent Comments