When it comes to cloud data protection, it's not just credit card numbers that need protecting, it's also the data that represents a majority of your company's value: your intellectual property.
Central to DcyFS's cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.
Decoy File Systems (DcyFS), a new file system approach recently unveiled in Paris, complement access control schemes and can help overcome many of the fundamental limitations of traditional ACLs.
Less than two weeks after its initial detection, STOP ransomware variant KeyPass has infected devices across 20 countries, according to security researchers.
Researchers from Quick Heal Security Labs discovered a new family of ransomware that spreads via spam emails and appends the extension ".Armage" to all files it encrypts.
How can companies gain the visibility they need to monitor their most sensitive accounts and databases when an administrator leaves? A privileged account management solution is a great place to start.
Data classification takes on even greater importance today in the context of regulatory compliance mandates and debates over data privacy. Here's what you need to know.
Organizations looking to invest in enterprise blockchains to unify and secure transactions and data records should do their homework before trusting a vendor with their most sensitive information.
Despite the risks quantum computing might pose to organizations, this emerging technology also promises to enhance cybersecurity capabilities such as SIEM, incident response and data protection.
A July 2018 threat report from IBM X-Force Exchange revealed that threat group Magecart exploited unsecured third-party access to steal credit card details from Ticketmaster customers.