Please turn on your JavaScript for this page to function normally.
businessman
Cybersecurity remains non-core competency for most C-suite executives

In today’s digital economy, it is essential that companies of every size can collect, store and adequately protect customer data and proprietary secrets. Failure to do so will …

face
Identity verification: Staying ahead of post-breach era consumer preferences

In the wake of numerous high-profile data breaches and privacy incidents, consumers are increasingly concerned about the security of their identities and what companies are …

person
Cybercriminals will gravitate to criminal activity that maximizes their profit

McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average …

Microsoft PowerShell
91% of critical incidents involve known, legitimate binaries like PowerShell

Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …

bot
Mobile is the new frontier for malicious bots

Distil Networks analyzed over 100 million mobile devices on its networks. The findings suggest that sophisticated cybercriminals and bot operators now implement a new …

transformation
Data guides the new security perimeter

A recent Kaspersky Lab report finds data breaches now cost enterprises more than $1.2 million. The report also finds that the success of digital transformation projects are …

chess
Confidence wavers in face of evolving cybersecurity threats

Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …

Hand
How criminals abuse IDNs to conduct malicious activities

New research from Farsight Security examines the prevalence and distribution of IDN lookalike domain names, also called homographs, over a 12-month period with a focus on 466 …

DDoS
Bot-driven credential abuse, DDoS attacks continue to rise

Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …

architecture
Managing and maintaining security in the enterprise

In the digital age, more often than not, organizations are playing defense against cybercrime. In fact, a report from Online Trust Alliance shows businesses reported 159,700 …

Ocean's Eleven
Has your security evolved to counter Ocean’s Eleven of threat scenarios?

In assessing how the cyber threat and mitigation landscape has evolved over time, I often think of the ways that “cops and robbers” movies have changed: In the old days, a …

biohazard
Why cybercriminals are turning to cryptojacking for easy money

The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 percent in 2017. …

Don't miss

Cybersecurity news