A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.
While the cybersecurity skills gap is a years-old challenge, organizations are facing a new conundrum: The cyber kill chain is getting shorter. How can the industry address these dual problems?
To best manage mobile security within your enterprise, you need to maintain balance between technology, enterprise and user responsibilities.
IT complexity has created a "glass half empty" attitude toward information security. Even so, effective cybersecurity remains simple — just not easy.
Threat actors are using targeted attack tools to distribute typical malware, such as cryptocurrency miners and ransomware.
In addition to oil and gas companies, the XENOTIME threat group has begun targeting electric utility organizations located in the U.S. and elsewhere.
The security industry does a thorough job of conveying the latest cybersecurity news, albeit sometimes to the detriment of the people whose job it is to set security priorities.
In theory, dealing with BlueKeep should be no different from dealing with other vulnerabilities. Unfortunately, many organizations are lagging in their patch management efforts.
While risk assessment is a regular topic of conversation today, when it comes to practicing good risk estimations and decisions in our daily lives, humans have some serious shortcomings.
With the advent of digital transformation, it becomes even more important — and urgent — that business technology awareness be stressed right along with security awareness training.