An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
Security researchers identified two new threats in the wild that are designed to compromise consumer devices to build IoT botnets.
IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute.
While securing the variety of known devices on your network is hard work, it may feel impossible to manage uninvited guests. Here's how to effectively manage rogue devices.
WPA3, which was released in June 2018, promises to improve Wi-Fi security — but the changes will be gradual because the Wi-Fi Alliance will need to certify routers to work with the new protocol.
The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.
Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.
In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently.
As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
When the machine learning technology cyber defenders use to stop DDoS attacks inevitably falls into the hands of malicious actors, which side will win?