Twitter spy scandal a wake-up call for companies to clean up their data access acts
Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.
Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.
Concerns over possible nefarious use of the cryptocurrency may be causing Visa, MasterCard and others to tap the brakes on the project.
Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat.
Blockchain, with its encrypted and immutable record, will eventually be used create universal digital identities, filled with information that only we will control and that will link back to the issuing banks, governments or even employers.
Mobile printing is making major strides right now. Is your company's mobile print security up to speed?
Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.
When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.
How much security risk can an organization accept before it’s on very thin ice? The equation is simple: decide how much money it will take to reduce the risk, and how much more money an organization will earn by accepting that risk. Equifax presumably decided that accepting a large amount of risk, in hopes of making a larger amount of money, was a good gamble. In the case of the massive data breach, Equifax lost that gamble badly.
Credit and payment card thieves are getting more sophisticated as chipped cards drive them to account takeover and card-not-present schemes.
Medical devices lack many features and capabilities that help protect other network-attached devices from attack.
While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.
Code embedded in hardware has vulnerabilities and it's harder to patch. That will make it a target for hackers.
Companies are regularly compromised by social engineering schemes, such as phishing and ransomware. Here’s what they can do prevent attacks and, if that’s too late, mitigate the damage.
Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees?
High-profile breaches are just the tip of the iceberg. Many have never been detected or disclosed--and without a major infrastructure changes it's only going to get worse
Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity?
There are a million things to worry about but these chief security officers provide advice on how to start off on the right foot.
It’s no longer about whether or not you’ll get attacked, it’s about knowing what the repercussions are and if you have the right controls to minimize or completely eliminate the fallout. In order to be able to do this effectively, you need be attuned with your network controls and architecture. VArmour CEO Tim Eades offers a few questions decision makers should be asking to ensure they keep their organizations from being the next Yahoo.
Changing passwords is supposed to make things more difficult for attackers. Unfortunately, research shows that human nature means it makes it easier.
There is no manual on how to get noticed by key executives. Here are some tips for getting on a board of directors as the cybersecurity expert.