The median dwell time for companies located in Asia-Pacific is nearly twice as long as that of organizations based in other parts of the world, according to a recent study.
For incident response teams, resuming normal operations in the wake of a cyberattack is the name of the game. However, lack of preparation and poor communication can impede recovery efforts.
Over the course of 2017, the cyberthreat landscape shifted to accommodate a sharper focus on pure data destruction for the sake of disruption rather than monetary gain.
Winter holidays mean more cybersecurity breaches for enterprises. How can security leaders train staff members to better manage digital assets during this time?
While the rise of AI has stoked fears of job loss in many industries, security professionals have something new to worry about: AI cyberattacks.
Before sharing indicators of compromise, analysts must consider the sensitivity of the data and verify the identities of the senders and receivers.
Threat actors are targeting energy facilities in Europe and North America in a fresh wave of cybersecurity attacks that could disrupt operational systems.
A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
Energy management systems are prone to remote attacks because of a lack of focus on security, researchers from Columbia University found.
IBM X-Force IRIS combines incident response with threat intelligence to help organizations analyze cybercriminals' behavior and predict future trends.