Security News

Not only are we now seeing the most powerful DDoS attacks ever recorded, but they also are leveraging the ever-growing army of IoT devices. Gary Sockrider of NETSCOUT Arbor offers advice for...

The U.S. Department of Defense this week released its 2018 cyber strategy, which outlines how the organization plans on implementing the country’s national security and defense strategies in...

Facebook this week announced the winners of its 2018 Internet Defense Prize. Three teams earned a total of $200,000 this year for innovative defensive security and privacy research. read more

The U.S. Defense Advanced Research Projects Agency (DARPA) has selected BAE Systems to develop data-driven, cyber-hunting tools that detect and analyze cyber threats to help protect enterprise...

Rather than eliminating bugs, the idea is to add large numbers of non-exploitable bugs to software as decoys to waste cyber-criminals' time.

KnowBe4 shared its Top 10 Global Phishing Email Subject Lines for Q2 2018. The messages in the report are based on simulated phishing tests users received or real-world emails sent to users who...

Lastline CEO Chris Kruegel on How to Get to the Heart of Defending Critical DataBreach defense is a strategic business issue for most enterprises, but too many cybersecurity solutions rely more on...

Few organizations are prepared to mitigate supply-chain risks, despite a majority of them acknowledging they are a huge cyber threat.

Proofpoint announced the availability of Proofpoint Cloud Account Defense (CAD) to detect and protect Microsoft Office 365 accounts, preventing attackers from causing financial and data loss....

Needs the ability to cope with Microsoft docs without breaking The US Department of Defense is exploring how AI might be able to help it automatically label secretive information and control who...