According to security firm Menlo, many popular websites are more vulnerable to internet security threats such as typosquatting and background attacks than their reputations would suggest.
Organizations are increasingly failing to secure internet-facing industrial control systems (ICS) that manage critical infrastructure, putting them at risk of ICS-specific malware.
Endpoint management and security is a daily battle. You need a solution that helps you discover, manage and secure your endpoints faster, more easily and more consistently.
Organizations around the world should take stock of the security lessons they learned in 2017 to set realistic, achievable goals for the new year.
The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.
Wi-Fi Protected Access (WPA3), the updated version of the globally used wireless security protocol, is set to launch later this year to help boost network defenses.
IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
In recent months, security researchers have identified Punycode attacks as part of malvertising and phishing campaigns targeting both individual users and major email providers.
Security vulnerabilities stemming from improper handling of non-ASCII characters in email headers could enable fraudsters to launch spoofing attacks.