Security News
Attacks against automated teller machines (ATMs) are nothing new, for obvious reasons. They are a perfect target for both conventional thieves and hackers, standing at the intersection of physical...
Authors of the book LikeWar detail how social media can be weaponized. Read the questions they recommend business leaders ask and answer in preparation for a LikeWar.
Bruce Schneier discusses the clash between critical infrastructure and cyber threats.
New Threat Detection Marketplace Connects AV Companies and Enterprises to Improve Protection Coverage Against New Threats read more
Fouad Khalil of SecurityScorecard on a Dynamic ApproachApplication threat modeling enables the systematic evaluation of applications from an attacker's point of view, says Fouad Khalil of...
User behavioral analytics can help better detect indicators of potential threats, both external and internal, says Carl Leonard, principal security analyst at Forcepoint.
Some 42% of companies say employees have fallen victim to a phishing attack, according to EdgeWave. Here's how to keep them safe.
The African Grey has tried to get Alexa to send him lightbulbs, a kite, watermelon, ice cream, strawberries, raisins, broccoli and ice cream.
JASK revealed the expansion of its threat-hunting-as-service offering, JASK Special Operations. Based on customer demand since its launch in May 2018, JASK deepened the team’s talent with the...