Ensuring organizations adapt while also retaining a high level of digital trust is exactly where the chief information security officer (CISO) can help.
According to a new U.K.-based study, 100 percent of test spear phishing attacks gained access to sensitive university data in less than two hours.
Tax scam season has arrived. Here's what enterprises need to know to keep their corporate assets safe from tax-time scammers.
We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?
Basic cyber hygiene only goes so far. Organizations need immersive cyber fitness training to make better decisions in the face of crisis situations.
A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.
Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.
Security researchers discovered a new ransomware family called Unnam3d that moves targeted files into protected RAR archives and demands an Amazon gift card as ransom.
Healthcare security is going to play a huge role if the utopian vision of a purely digital healthcare ecosystem is going to be realized.