The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
Blockchain has the potential to revolutionize the way businesses conduct financial transactions in the next few years, according to security experts.
Customer data could be at risk after a bug at content delivery specialist Cloudflare spilled private information from its clients online.
According to the results of a recent Ponemon Institute survey, 76 percent of organizations lack a holistic risk management strategy.
To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.
In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.
Humans represent the weakest link in the cybersecurity chain. An effective defense strategy starts and ends with cyber situational awareness.
IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.
Upon reviewing the state of health care security in 2016, data revealed that the sector suffered nearly every type of common attack at an increased rate.
This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.