EU Ready to Take On Cross-Border Attack with New Europol Protocol
In about two months, two years will have passed since the WannaCry ransomware attack, a ...
Successful Convergence of IT and Operational Technology will be Vital for Strong Cyber Security
The Internet of Things (IoT) and Industrial IoT represent a massive new cyber security ...
Addressing the Human Error Causes of Security Breaches
Cyber security breaches can come from a wide variety of sources: Hackers out to exploit ...
Verizon Study Shows Mobile Devices among Top Entry Points for Hackers, Ransomware Remains Most Successful Attack
The Facebook data breach of 2018, probably the biggest of the year, illustrates better than ...
The Long Road Toward Building Secure Software at Enterprise Scale
Since the rise of eCommerce in the late 1990s, enterprises have sought ways to improve the ...
It’s Time Manufacturers Assemble a Sound Cybersecurity Effort
Recently the ISACA (Information Systems Audit and Control Association) and the Digital ...
Cybercrime Costs Climb 12% to $13 Million per Company in 2018
Financial damage associated with cybercrime and insider threats jumped 12% globally in 2018 ...
Microsoft: Phishing Attacks Increased 250% from January to December 2018
Phishing remained a preferred attack vector in 2018, with hackers ramping up their efforts ...
FBI Boss Warns Businesses of Chinese Hackers Stealing Their Intellectual Property
What's the biggest cybersecurity threat for US businesses?
Thwarting GandCrab in the New Era of Agile Computer-Jackers
New Bitdefender decryptor can be deployed across the network to automate recovery
Data Breach Disclosures by UK Banks Jump 480% in 2018, Financial Regulator Says
In 2018, companies struggled to mitigate large-scale attacks and data breaches, but ...
Embracing Heterogeneity
To say that modern-day IT infrastructure is diverse is an understatement. Today’s enterprise ...


