Analyzed cards, mainly from smartphones and tablets, contained private personal information, business documentation, audio, video, and photos. Wipe your device, then check it twice: A new study has found...
Read moreThe 6 Worst Insider Attacks of 2018
July 1 2018Stalkers, fraudsters, saboteurs, and all nature of malicious insiders have put the hurt on some very high-profile employers. Image Source: Adobe Stock (Andrea Danti) If recent statistics are any...
Read moreAdidas US Website Hit by Data Breach
June 30 2018The athletic apparel firm was hacked and data on potentially ‘millions’ of customers now at risk. Adidas is the latest retailer to get hit with a data breach: the...
Read moreWhy Sharing Intelligence Makes Everyone Safer
June 30 2018Security teams must expand strategies to go beyond simply identifying details tied to a specific threat to include context and information about attack methodologies. Cybersecurity is sometimes viewed as...
Read moreNatural Language Processing Fights Social Engineers
June 30 2018Instead of trying to detect social engineering attacks based on a subject line or URL, a new tool conducts semantic analysis of text to determine malicious intent. Social engineering...
Read moreSudhakar Reddy Bonthu used insider information about the company’s 2017 data breach to profit in stock transaction. Fallout from the epic Equifax data breach just keeps coming: A second...
Read moreThe paradox of cybersecurity automation: It makes your staff more productive but takes more quality experts to make it work. Enterprises increasingly depend on security automation and orchestration to...
Read moreWhy technology alone can’t reduce risk
June 29 2018CSO Online | Jun 28, 2018 Sponsored by Centrify — John Kindervag, Zero Trust founder and former analyst at Forrester Research, and Dr. Chase Cunningham, Principal Analyst, Forrester Research,...
Read moreBotnets Evolving to Mobile Devices
June 29 2018Millions of mobile devices are now making requests in what’s described as “an attack on the economy.” Botnets have tended to hide in the nooks and crevices of servers...
Read moreTwo-Step Verification
June 29 2018The process of authentication, or proving who you are, is key to protecting your information, such as your email, social media, or online banking accounts. You may not realize...
Read more
Recent Comments