An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit OT security risks that were previously the domain of the IT environment.
How does Star Trek's information security stack up against current cybersecurity hygiene best practices? Turns out the future's not so bright.
Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.
When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.
Let's talk operational technology security: How can companies devise a winning OT security strategy to bridge the physical/digital divide?
Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it's both.
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.
According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?
The Belkin Wemo Insight smart plug continues to be at risk of zero-day attacks nearly one year after a vulnerability was first disclosed, security researchers discovered.