Security researchers discovered a new fileless malware strain targeting bank customers in Brazil and Thailand with a hack tool and at least two infostealers.
Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives.
To gain the buy-in you need to make your IAM program successful, it's important to consider your employees' goals and needs during the design process.
With a little education and a lot of communication, security leaders can steadily reduce employee negligence over time through consistent, comprehensive awareness training.
Some refer to information security as a war, but it's better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.
Cloud gaming service Steam pulled a game from its library on July 30 after users reported that it was actually a cryptojacking scam.
Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.
Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure.
Security teams need a single, scalable cloud solution that integrates seamlessly with a SIEM platform to identify shadow IT — and cut through the fog of cloud security.