Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it's important to understand the difference between true threat hunting and marketing jargon.
Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.
Given the historic data breaches, widespread vulnerabilities and onslaught of data privacy regulations that affected businesses around the world in 2018, security culture is more crucial than ever.
The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible.
Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats.
Given the increasingly sophisticated and interconnected nature of the cyberthreat landscape, organizations must collaborate across sectors to improve cyber resilience around the world.
The Science Channel documentary, "Dark Web: Fighting Cybercrime," shows why practice runs are essential to help security teams and business leaders keep their cool in the face of a cyberattack.
New data reveals that security professionals are increasingly concerned about employee negligence because it forces them to respond to preventable data breaches.
Despite an overall shift away from traditional ransomware in favor of crypto-mining malware, research shows that ransomware is still alive and well in the form of highly targeted attacks.
Although IT leaders have traditionally struggled to gain executive buy-in for greater security budgets, recent data revealed that cyberthreat concerns are creeping closer to the top of CEOs' agendas.