Security News

Usual Threats, But More Sophisticated and Faster: Report
2018-03-13 15:50

Almost Every Type of Cyber Attack is Increasing in Both Volume and Sophistication Eight new malware samples were recorded every second during the final three months of 2017. The use of fileless...

FireEye’s Marina Krotofil On Triton and ICS Threats
2018-03-12 17:23

At the Security Analyst Summit this year in Cancun, FireEye's Marina Krotofil talks about the Triton malware, first disclosed in December 2017, that targets industrial control systems.

Keeping Up With the Evolving Threat Landscape
2018-03-06 16:33

To keep up with the ever-evolving cyberthreat landscape, healthcare organizations must combine basic security principles with advanced technologies, Kristopher Kusche, CISO at Albany Medical...

Intimate Partner Threat
2018-03-05 17:13

Princeton's Karen Levy has a good article computer security and the intimate partner threat: When you learn that your privacy has been compromised, the common advice is to prevent additional...

Five Threat Groups Target Industrial Systems: Dragos
2018-03-01 06:39

There are at least five sophisticated threat groups whose activities focus on industrial control systems (ICS), according to a report published on Thursday by industrial cybersecurity firm Dragos....

Fortinet Enhances Network Security OS, Adds AI-based Threat Detection
2018-02-28 16:53

Two major new product announcements were made at Fortinet’s Accelerate 18 conference this week, including a new machine learning (ML) threat intelligence and detection offering, along with a major...

How to Shield Against IoT Security Threats
2018-02-28 12:14

While politicians and security experts are constantly warning about the risk of cyber-attacks, they rarely, if ever, mention the risks associated with the Internet of Things (IoT). They should,...

Today's Threat Landscape Demands User Monitoring
2018-02-27 13:38

For a complete picture of user behavior, you need visibility both on and off the corporate network.

A view of the global threat landscape: Cybercrime and intrusion trends
2018-02-26 16:22

Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, disrupt and destroy...