Security News

Confluera, the real-time cybersecurity company, announced that it has raised $9 million in Series A funding led by Lightspeed’s Ravi Mhatre with significant participation by John W. Thompson,...

Experts Say Bank May Have Made Several ErrorsThe cause of Capital One's breach is known. But experts say the incident still raises questions over why Capital One held onto personal data so long...

Palo Alto, California-based start-up Confluera has simultaneously announced a Series A funding round of $9 million and the launch of its new Real-time Attack Interception and Defense (RAID)...

Cybersecurity researchers have uncovered a new piece of mobile surveillance malware believed to be developed by a Russian defense contractor that has been sanctioned for interfering with the 2016...

Digital Defense and The University of Texas at San Antonio (UTSA) Department of Computer Science jointly announced a partnership that will provide students and faculty with access to an...

As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.

From malware and phishing to cryptojacking and man-in-the-middle attacks, mobile threats are rampant, and organizations need to stay a step ahead. Traditional threat management has been reactive....

IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, according to Sophos. The...

BeyondTrust's Karl Lankford on Mitigating the Unmanaged Privilege ThreatAttackers crave insider-level access to IT infrastructure and regularly target insiders - and especially administrators- to...

Rep. Tom Graves, R-Ga., is reintroducing his Active Cyber Defense Bill today. He first floated the idea in March 2017, and published an updated version in May 2017. It was then, and is now, being...