Security News

You may find it surprising that small businesses make up more than 97% of total businesses in North America, according to the Better Business Bureau (BBB). Given this statistic, I suppose the good...

Verint Systems, a global provider of data mining software for cyber security and intelligence, announced that it has launched Luminar, a new Cyber Threat Intelligence software solution that boosts...

Security Experts Say Prosecution's Document Offers Critical Cybersecurity InsightsThe indictment of two Chinese men for a 2014 cyberattack on health insurer Anthem that compromised information on...

Despite many improvements to security technology, information sharing, ease-of-use, and reduction in cost over time, we have yet to see a meaningful reduction in breaches. Why? The answer may have...

The good news is: The development of new malware exploits has slowed considerably. The bad news is: That's because the old ones still continue to work so effectively. Adam Kujawa of Malwarebytes...

Bandura Cyber and Global Resilience Federation (GRF) announced a partnership to integrate automated intelligence feeds and gateway technology for the perimeter defense of GRF affiliated companies....

Bay Dynamics, a leader in cyber risk analytics, announced that the Bay Dynamics Risk Fabric platform now integrates with Carbon Black’s next-generation antivirus (NGAV) + endpoint detection and...

Boffins from Belgium break people recognition software with a colorful placard A trio of Belgium-based boffins have created a ward that renders wearers unrecognizable to software trained to detect people.…

Martin admitted that for more than 20 years, he stole and a vast quantity of highly classified information, stashing it in his home and car.

Few professionals are completely confident in their ability to assess the effectiveness of their phishing awareness efforts. In a new paper, Phishing Defense and Governance, released in...