According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.
Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.
An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.
Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.
A malicious Google Chrome extension is making the rounds to deliver malvertising. Here's how it works and how to avoid getting scammed.
IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.
Fraudsters with deep pockets have been spreading malware to Tor users through signed DRM files that redirect victims' browsers without warning.
Long-standing security threats such as social engineering are predicted to take on new dimensions in the year ahead.
With threats coming from all sides, it's easy for IT professionals to forget that cybercrime can take many unsophisticated forms.