Splash Data released its list of the worst passwords of 2018. How does your enterprise stack up, and what advice can you give users to help improve their password security hygiene in the new year?
IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.
The majority of financial cybercrime risks can be mitigated with continued user education and by placing the right controls on user devices to help protect against malware.
Researchers reported that threat actors are using web services such as Google Drive, SharePoint and Dropbox to host files containing malicious links as part of phishing campaigns.
Security researchers discovered a recent phishing scheme that took advantage of Hurricane Michael's impact to steal victims' email credentials across multiple services.
By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.
A new batch of industry-specific phishing campaigns is leveraging compromised email contacts to steal login information associated with employees of engineering, transport and defense organizations.
A group of researchers proposed a new framework that would enable web services to share users' password hash data in an effort to reduce password reuse.
Human error, credential misuse and disgruntled employees aren't the most common threats security leaders have to face — but the complexities of these incidents make insider threats the stuff of CISO nightmares.
Organizations need a privileged account management (PAM) solution that integrates seamlessly with the existing security environment — and helps security teams enforce least privilege policies.