A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
When it comes to security metrics, greater accuracy yeilds greater value, but complete context requires a diversity of insights. What if you can't have both?
One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.
As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019.
A proactive, integrated business continuity management process will significantly boost the efficiency and value of your overall security program, according to the "2018 Cost of Data Breach Study."
A security escape room can be a fun and interactive way to train employees on various security concepts they might otherwise ignore.
Nearly one-third of incidents reported in Q3 were classified as "destructive attacks," according to a recent report, putting election security at risk leading up to the 2018 midterms.
Passive DNS replication can be an essential source of data to contextualize your threat intelligence and inform your incident response plan.
How Security Consultant Ben Goodrich Uses Physics to Navigate the State of Constant Change in Cybersecurity
Just three years ago Ben Goodrich graduated with a degree in physics. Today he's a security consultant working with the world's biggest companies to provide an injection of cybersecurity expertise.
Encouraging young people to pursue a security career is not just the job of the public sector. Organizations that hire security professionals also have a responsibility to help grow this talent pool.