In the near future, we're going to see the role of office power broker shift from an administrative assistant to a virtual assistant. How does the CISO's role change in this cognitive enterprise?
MMOs offer key lessons to help enterprises improve their cybersecurity best practices. Here's a look at the top three.
A new threat called HiddenWasp is different from other Linux malware in that it's focused solely on achieving targeted remote control of infected hosts.
While AI in cybersecurity is still in its infancy, the inaugural Ai4 Cybersecurity conference was a great first step in advancing the discussion, especially as it relates to application security.
Businesses need to adopt a strategic approach to managing third-party risks that provides an integrated view of the vendor relationship process.
Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?
The Federal Bureau of Investigation (FBI) has determined that more than 100 U.S. businesses suffered Ryuk ransomware infections between August 2018 and mid-May 2019.
Cybersecurity AI is approaching maturity. Are you prepared to defend against a new wave adversarial machine learning risks?
How does Star Trek's information security stack up against current cybersecurity hygiene best practices? Turns out the future's not so bright.
According to Forrester, unified enpoint management enables customers to initiate a low-touch, no-touch process that reduces the time and effort needed to configure endpoints by as much as 96 percent.