Security professionals waste time and money choosing which security alerts to investigate. Automation is a great way to track and analyze threats.
According to an IBM-sponsored Ponemon Institute study on mobile security, apps are being created quickly to meet user demand but are not always secure.
SSH keys are valuable to cybercriminals because stolen credentials can be used to access critical servers. Here are some facts regarding the issue.
IT organizations are wasting valuable time and money hunting down false positives while advanced persistent threats evade preventive controls.
Cloud applications have heightened the risks to corporate data posed by insiders with authorized access to enterprise systems, a recent survey shows.
An organization's employees need to be taught proper security principles in order to play their role in keeping the enterprise safe from threats.
The recent breach of JPMorgan Chase's network — one of the biggest in history — may have been caused by malware compromising an employee's PC.
Five best practices to maximize your organization's mobile application security program.
Ponemon Institute Shares New 2014 Research on Data Breaches Over the last year, the average cost in the U.S. for each lost or stolen record containing personally identifiable information has increased by 9 percent, from $188 to $201. In addition to...