Personal health information is extremely valuable to threat actors, and companies that store customers' health data need to be wary of healthcare cyberattacks that could threaten their business.
Over the next two months, companies should educate and test their employees to prepare for the rise in phishing attacks related to benefits enrollment and holiday party and charity campaign planning.
This year, IoT security jumped in importance for many security professionals as enterprises continue to adopt more IoT technologies. Now, our security tools and solutions need to catch up.
In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
While massive data breaches typically hog all the cybersecurity headlines, SMB security is also at risk as cybercriminals go after easy targets with low IT budgets.
The U.S. Secret Service is investigating a new ATM attack that, unlike previous "cash-out" attacks, uses advanced, custom-build skimmers to steal credit card information and PINs.
As data becomes more fluid, dynamic and distributed, so do the challenges around protecting it. Unlike traditional data stores, there is little to no control of unstructured data.
Decoy File System's overlay layer is a forensic tool that helps security teams piece together what happens during a cyberattack and collect key evidence in the aftermath of a breach.
When it comes to cloud data protection, it's not just credit card numbers that need protecting, it's also the data that represents a majority of your company's value: your intellectual property.
Central to DcyFS's cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.