Security News > 2019 > April

It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.

Major threats to information security emerging over the next two years could impact businesses operating in cyberspace at break-neck speeds.

Building and implementing a micro-segmentation strategy requires careful planning and orchestration to ensure it is effective.

Microsoft's new cloud-hosted security information and event management service rolls out in a public preview.

The cybercriminal group behind the infamous DNSpionage malware campaign has been found running a new sophisticated operation that infects selected victims with a new variant of the DNSpionage...

Scotland: For First Time, Secretive Alliance Group to Talk Together in PublicFor the first time ever, members of the secretive "Five Eyes" intelligence-sharing group will make a joint public...

Workers in R&D/Engineering are the most heavily targeted group of employees within organizations, a new Proofpoint report says, and lower-level employees are at a higher risk of email-borne cyber...

Extortion has become the second most often reported type of cybercrime, but BEC/EAC scams still reign supreme when it comes to monetary loss (or criminals’ earnings), the latest IC3 Internet Crime...

As trusted partners, third-party vendors often become the overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to increase...

Taking place across 5 days from the 6th till the 10th of May 2019, HITBSecConf2019 Amsterdam is one of the most prestigious cybersecurity events in Europe. With the event celebrating a decade of...