Security News

Digital Defense and The University of Texas at San Antonio (UTSA) Department of Computer Science jointly announced a partnership that will provide students and faculty with access to an...

As the in-vehicle technology continues to innovate, hackers are continuing to learn and find vulnerabilities to exploit.

From malware and phishing to cryptojacking and man-in-the-middle attacks, mobile threats are rampant, and organizations need to stay a step ahead. Traditional threat management has been reactive....

IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, according to Sophos. The...

BeyondTrust's Karl Lankford on Mitigating the Unmanaged Privilege ThreatAttackers crave insider-level access to IT infrastructure and regularly target insiders - and especially administrators- to...

Rep. Tom Graves, R-Ga., is reintroducing his Active Cyber Defense Bill today. He first floated the idea in March 2017, and published an updated version in May 2017. It was then, and is now, being...

You may find it surprising that small businesses make up more than 97% of total businesses in North America, according to the Better Business Bureau (BBB). Given this statistic, I suppose the good...

Verint Systems, a global provider of data mining software for cyber security and intelligence, announced that it has launched Luminar, a new Cyber Threat Intelligence software solution that boosts...

Security Experts Say Prosecution's Document Offers Critical Cybersecurity InsightsThe indictment of two Chinese men for a 2014 cyberattack on health insurer Anthem that compromised information on...

Despite many improvements to security technology, information sharing, ease-of-use, and reduction in cost over time, we have yet to see a meaningful reduction in breaches. Why? The answer may have...