IBM acquires CrossIdeas, a provider of identity and access governance and analytics software that helps organizations to manage people and...
Today, cyber criminals are applying ancient approaches to modern technologies by using ransomware and cyber extortion to demand money from victims.
Citadel, a type of malware, can now persistently have remote control of devices, which is an advanced threat that can affect many victims.
The more complex we make something look or seem, the more it is falsely perceived as brilliant, which is very common in the world of cyber security.
If you are attending this year's Black Hat USA conference, don't miss the following must-see briefings given by top industry professionals.
Cloud computing is transforming IT. As with most new technology paradigms, security concerns surrounding cloud computing have become the most widely talked about inhibitor of wide spread usage. To gain the trust of organizations, cloud services must deliver security and privacy expectations that meet or exceed what is available in traditional IT environments. Customers are […]