As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
A new report found that banking Trojans accounted for more than half of all malicious payloads observed in the fourth quarter of 2018.
Security analysts identified a sample of Linux crypto-mining malware that kills any other malicious miners upon installation.
A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.
Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player — and to have a major business impact — has never been better.
Security researchers observed an attack campaign that is targeting Linux servers to install samples of the new SpeakUp Trojan.
An analysis of more than 4.4 million malware samples showed botnets were responsible for crypto-mining at least 4.3 percent of Monero over a 12-year period.
While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices.
The integrity of the applications deployed to your workforce is crucial to enterprise security. The app approval workflow helps you vet these programs and integrate them with existing tools.
Researchers have spotted a malvertising campaign that is delivering two payloads to victims: the Vidar information stealer and GandCrab ransomware.