For the enterprise responsible for protecting customers' PII, should passwords be stored at all — even encrypted?
A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
Healthcare security is going to play a huge role if the utopian vision of a purely digital healthcare ecosystem is going to be realized.
A data leak involving a family tracking app exposed the real-time locations of more than 238,000 users for weeks as a result of a database misconfiguration.
A recent security incident that began as an email leak exposed more than 2 billion records containing email addresses and other personal information.
Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.
Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.
As data becomes more fluid, dynamic and distributed, so do the challenges around protecting it. Unlike traditional data stores, there is little to no control of unstructured data.
U.K. business experienced 600 cyberattacks a day between January and March of this year, according to recent cyberthreat statistics.