Network and endpoint access procedures have progressed to the point that now identity is the new perimeter of cybersecurity. Improving methods of multifactor authentication is crucial to building trust.
Researchers from Threatcare and IBM X-Force Red joined forces to test several smart city devices, with the goal of investigating "supervillain-level" attacks. Here's what the teams found.
DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know.
Becoming a JSON formatter, and packing up your data in a new way, can reduce or eliminate the need for custom work and save your security team precious time.
Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.
Today's security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.
As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don't know how to get the most out of their security information and event management (SIEM) solution.
Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.
Without network visibility, organizations run the risk of mishandling customers' personal data and running afoul of new compliance mandates.
Many organizations are hiring a security data scientist to support analysts and provide deep insights to the chief information security officer (CISO).