Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.
When evaluating cloud providers, it's important to understand who is responsible for cloud security. Since the lines are often blurred, encryption is imperative to keep your data from prying eyes.
A data leak involving a family tracking app exposed the real-time locations of more than 238,000 users for weeks as a result of a database misconfiguration.
Unauthorized individuals compromised and potentially exposed more than 350,000 Oregonians' protected health information (PHI) in a HIPAA breach.
Security researchers discovered an attack campaign targeting Japanese users with a new variant of Ursnif banking malware.
A recent security incident that began as an email leak exposed more than 2 billion records containing email addresses and other personal information.
The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
Digital criminals tried to impersonate oil and gas companies in a recent attack campaign distributing Shade ransomware.
Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.