Security News

Education plays a critical role in any program designed to combat insider threats, says Christopher Greany, head of group investigations at Barclays. He'll discuss how to start an insider threat...

Because cybersecurity has been such a pain point for businesses, it’s easy to assume that threat investigations are difficult and unwieldy to manage. When you consider what’s at stake—customer...

Digital Shadows has announced the availability of Shadow Search – providing security analysts with a search tool to make decisions to protect their organization from cyber threats. Previously...

Experts brief Reg readers on how to keep bad actors at bay Broadcast On 26 September 2018 at 10am PDT, 11am MT, 6pm UK, we'll have a studio full of experts lined up to talk about insider threats...

Cloud lineup gets security overhaul with 2FA and new monitoring tools Ignite Microsoft is beefing up the security in its cloud services lineup with a handful of unveilings today at this year's...

Though there is debate over the various attributes that make up threat hunting, every SOC has the potential to engage in some level of hunting – and taking action is what’s truly important.

Proofpoint's Denis Ryan on How Defenses Can Adapt to Latest AttacksEmail fraud threats have evolved from attackers targeting networks to them focusing on specific individuals within an...

Cybercriminals are adopting creative new techniques to target their victims at an unprecedented pace and are constantly seeking methods to avoid law enforcement detection. To stay ahead of them,...

A well-thought out and managed social media presence is a must for most companies and their workforce, but too few of them think about the potential repercussions of an attack targeting it. Social...

Your video guide to locking down systems – and then fire questions our way Promo On September 26 at 10:00 PT / 11:00 MT / 13:00 ET / 18:00 BST we're broadcasting live with an exploration of...