Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.
People Inc., a nonprofit organization based in New York state, has traced a recent data breach to compromised employee email accounts.
IoT technology is taking over the healthcare industry because it has become essential. But once a device is connected to your network, who is responsible for IoMT security and privacy?
When you implement a privileged access management solution as a standalone project, you will often face the same challenges that you had before you implemented it.
Digital fraudsters are sending out emails and SMS messages that link to tech support scams hosted on popular cloud platforms.
Let's talk operational technology security: How can companies devise a winning OT security strategy to bridge the physical/digital divide?
Good communication, clear expectations and enforced boundaries are all key to the success of your security program.
A fusion center uses a wider set of data sources, collects data from both inside and outside the organization, and delivers it to the right people to help them respond and recover more efficiently.
SIEM tools can help security operations center (SOC) teams detect threats, but what good is threat data without the context analysts need to quickly respond to incidents? That's where SOAR comes in.
A level 3 security analyst announced he'll be taking a six-month leave due to "seriously fatigued fingers" and "a wonky eye" resulting from his daily activities to ensure data security and compliance.