The National Security Council (NSC) has announced that they will be taking the threat seriously.
Cybersecurity firm FireEye said this week it had been breached by hackers for a foreign government. If so, what chance does the average person have?
By Torsten George, cybersecurity evangelist, Centrify Phishing is one of the oldest tricks in a hacker’s playbook. The tactic can lure any employee from blissfully going about their ...
A cybersecurity framework is the basic structure of keeping technology safe from outside intrusion. Learn how to create or improve your own.
Cybersecurity Weekly: A hacker reveals 30% of black market credit cards. A Linux Sudo flaw. An RDP honeypot experiment. More security news and breaches.
The big corporations may grab the headlines, but America's SMBs have the most to lose in the aftermath of a data breach.
Your security posture and company’s profitability are more closely linked than you may realize Admit it: Growing and protecting your company’s bottom line is a top priority. While many ...
According to a research from Untangle, Small to medium-sized businesses (SMBs) are procuring security tools to prevent cyberattacks with limited cybersecurity budget and resources
The predominance of cybersecurity as a business issue extends to the board, with most executives reporting infosec is an agenda item for board meetings.
A concerning 81% of chief information security officers (CISOs) and chief information officers (CIOs) are routinely delaying security patches.
What will the 'new normal' look like in 2021 and how can these be secured? Understanding this will enable businesses to set their cybersecurity priorities and spending plans for for 2021.
The theft of red team tools, allegedly by Russia's Cozy Bear group, poses only a small threat to other organizations. The real lesson: Anyone can be hacked.
Most modern citizens have accepted the risks of putting their entire lives into… ...
Cyberthreat trends: 2018 cybersecurity threat review
The most significant threat facing the security of your company's information system is the internal employee threat. You must do what is necessary to ensure