The dark web market is shifting from commodities to cybercrime services such as infrastructure-as-a-service (IaaS) and malware-as-a-service (MaaS), creating benefits and challenges for security teams.
In addition to oil and gas companies, the XENOTIME threat group has begun targeting electric utility organizations located in the U.S. and elsewhere.
Security experts expect U.S. infrastructure to suffer a major cyberattack in the next two years, according a survey of recent Black Hat attendees.
The IoT is transforming before our eyes due to increasing regulations, growing demand for security standards and advancements in the telecom industry.
Today's IT professionals can extract many lessons from the infamous Stuxnet worm, which was discovered in 2010, to help them protect their SCADA systems.
A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.
Using legacy infrastructure does more than drive up the costs of maintenance; it also hinders innovation and increases risks related to security.
Free malware analysis sandboxes can be used as a means of enhancing cybersecurity without a major drain on time, money and other resources.
In planning for and responding to a data breach, IT experts should work with business continuity teams as part of a cohesive incident response plan.
In a world where a week rarely goes by without reports of at least one serious cyber attack against a major organization, it’s important for business leaders to always be asking the right security questions. We put together a list of 137 security...