Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?
Many of the city of Baltimore's public services remain offline two weeks after the municipality fell victim to a ransomware attack.
An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
It's important to recognize that a core outcome of security awareness and training efforts needs to be changing behaviors.
Researchers observed cybercriminals selling an updated version of the KPOT stealer on some underground hacking forums.
On this week's SI podcast, hosts Pam Cobb and David Moulton chat with cyber range coach J.C. Vega about his journey from the military to cybersecurity.
Here's what you need to know about organizational security culture — and how to plan for and inspire a better one.
Until now, we've looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it's time we look at the skills gap problem in different ways.
Good communication, clear expectations and enforced boundaries are all key to the success of your security program.
Before the first round of the Ukraine election in March, we decided that we couldn't afford to sit on our heels until an attack was launched.