Security researchers discovered that several new malware strains are targeting known Cloudera Hadoop vulnerabilities for bitcoin mining and distributed denial-of-service (DDoS) purposes.
The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.
The Marriott data breach could impact the personal information of approximately 500 million guests, including payment card data for about 327 million customers.
Collaborative industry partnerships, a hardened attack surface and a well-practiced incident response plan are all critical in the fight against emerging cybersecurity threats.
Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades.
With extra web traffic and high order volumes coming in, the holiday shopping season can be a particularly perilous time for retail cybersecurity.
If you've ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers' behavioral patterns.
Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage
Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms.
One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.
To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency.