Many IT professionals and executives alike are not addressing IoT security at the same level at which it's creating tangible business risks.
The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.
Similar to the GDPR, you can approach the NIS Directive as a roadblock or a nuisance, or you can consider it an excellent opportunity to improve your security posture.
To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems.
Researchers discovered new Trojan malware written in Golang that's targeting e-commerce websites with brute-force attacks.
The lure of social media is too much to fight against. Instead of pushing back, we need to work with what we've got and do our best to educate employees about potential social media attacks.
While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.
As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.
In the information security field, we're always practicing finding vulnerabilities, keeping threats at bay, responding to cybersecurity incidents and minimizing long-term business risks.