The U.S. Fire Administration's five key components of a fire safety education program serve as a useful framework for CISOs looking to boost their company's ability to respond to a cyber emergency.
Researchers uncovered a YouTube scam in which several fraudulent channels urge unsuspecting "Doctor Who" fans to submit personal data to supposedly stream the British science fiction show.
IBM X-Force researchers observed the Necurs botnet spewing millions of spam emails from more than 30,000 malicious IPs to extort bitcoin from victims who may or may not have viewed adult content.
Shir Levin used to report on government and law, but her journalism career wasn't data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud.
Cybercriminals have been getting an early start on tax-related phishing cases by promising U.K. users a sizable refund in an attempt to steal credit card details and other personal information.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
How the IBM X-Force IRIS Cyberattack Framework Helps Security Teams Reduce Risk at All Levels, Part 1
The IBM X-Force IRIS cyberattack preparation and execution frameworks aim to help security teams predict threat actors' motives and tactics and communicate security intelligence more clearly.
Researchers uncovered a spam campaign that threatened to unleash the devastating WannaCry ransomware on unsuspecting victims who failed to pay a fee of roughly $650 by June 22, 2018.
In June's security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.