Researchers at Trusteer, an IBM company, recently discovered the Kronos malware, which offers compatibility with Zeus, in a Russian cyber crime
Threat-aware identity and access management tools have the advanced capabilities necessary to protect an organization's business-critical data.
There is a troubling model of cloud computing that many businesses have not yet formally acknowledged, and cloud security is especially crucial here.
Researchers have discovered two additional variants of Boleto malware that operate quite differently from the previously discovered Eupuds malware.
A new study reports many IT security professionals are pessimistic about their ability to reduce the frequency and severity of advanced persistent...
Recent security breaches by trusted insiders have propelled Identity and Access Management (IAM) to the top security priority of many organizations. After all, it’s clear security is only as strong as its weakest link – people – and the press is full of articles documenting the damage people can do. So it’s natural for security […]