Security News
We think Gentoo Linux did a good job in a bad situation following its recent malware invasion, and we can all learn something from that.
Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage. For example, a new study found...
Cyber-threats pose an existential challenge, says RedSeal CEO Ray Rothrock.
Ping Identity announced partnership with SailPoint Technologies to provide identity access and governance for today’s most complex enterprise environments. This means global organizations now have...
MD Anderson Cancer Center Cited for Unencrypted DevicesA lack of device encryption will cost a Texas-based cancer treatment center $4.3 million in civil monetary penalties from the Department of...
Hint: Ashley Madison, Equifax and Uber are ThrivingLarge data breaches make headlines, trigger stock price slips and often lead to executives getting fired. But security consultant Eric...
Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to...
In light of new data privacy legislations, a new Webroot report looks at how businesses in the U.S., U.K., and Australia are adjusting to new data security measures in order to meet compliance...
Rick Moy on Using Deception for Better Breach Detection and ResponseAcalvio Technologies helps organizations practice "cyber deception" to more effectively detect and respond to data breaches,...
Distil Networks released The 2018 Anatomy of Account Takeover Attacks Report, based on data from 600 domains that include login pages. The study revealed that all monitored login pages were hit...