Security News

Untrained insiders and foreign governments create huge cybersecurity risks in government agencies, according to a SolarWinds report.

APT40 Hackers Appear to be Supporting China's Belt and Road Initiative read more

5,558 IT professionals from more than 150 countries involved in DevOps self-identified their level of maturity. What emerged from a subsequent survey was a close correlation between elite DevOps...

While mobile security risks have skyrocketed, 85% of organizations say they aren't doing enough to stay protected, according to a Verizon report.

Ireland's Data Protection Commission (DPC), headed by the Commissioner for Data Protection, Helen Dixon, has published its first annual report since the General Data Protection Regulation (GDPR)...

Several phone apps are sending sensitive user data, including health information, to Facebook without users' consent, according to a report by The Wall Street Journal. An analytics tool called...

Cybercriminals say they are willing to pay over a million dollars per year to individuals with network management, penetration testing, and programming skills willing to put on a black hat, a new...

A successful cyberattack is undoubtedly one of the most disruptive events an organization can experience. Whether it’s phishing, DDoS, ransomware or SQL injection, the incident often results in...

2018 saw the convergence of three separate threat trends -- two that have evolved over the last few years, and one that came to the fore during 2018. These are the merging of IoT botnets,...

Is it ok to launch a benign proof of concept that you know will go wide, to bring a flaw to people's attention, or should you stay quiet?