In theory, dealing with BlueKeep should be no different from dealing with other vulnerabilities. Unfortunately, many organizations are lagging in their patch management efforts.
The Federal Bureau of Investigation (FBI) has determined that more than 100 U.S. businesses suffered Ryuk ransomware infections between August 2018 and mid-May 2019.
A 13-year-old security threat known as Dharma ransomware is spreading through a variety of distribution methods, leading to a 148 percent increase in detections over a two-month period.
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.
Effective threat management requires security teams to combine various sources of security analytics with machine-generated data to investigate incidents with speed and accuracy.
Good communication, clear expectations and enforced boundaries are all key to the success of your security program.
Threat actors compromised an account with administrator privileges to infect a manufacturing company with BitPaymer ransomware.
Fighting fileless malware attacks will take some serious effort and careful coordination among a variety of tools and techniques.
We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?
Smartphones, tablets and cloud computing have been leading the way in the workplace until now, but the growing popularity of the internet of things could totally change the look of IT infrastructure.