By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
The Syrian Electronic Army gave Forbes and the rest of the Internet an ugly new reason to not use the same login information across multiple accounts.
In early 2014 the world's second-largest email service, Yahoo Mail, reported a data breach into its users' email accounts.
Hackers broke into The Washington Post's servers earlier this week and gained access to employee credentials. Unfortunately, this was not the first time.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
After several prominent Twitter accounts were hacked by attackers, it is clear that corporate credentials need to be protected by stronger security tools.