This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here's what you need to know.
Each year, NopSec conducts a survey of IT and cybersecurity professionals to glean a snapshot of the current state of vulnerability risk management and the outlook for VRM(Vulnerability Risk Management) in the coming year. This survey lets us take the pulse of security professionals across different types of businesses and at varying levels in their organizations, and provides some benchmarking figures for infosec teams who want to know how the maturity of their VRM programs compare.
Today, many people use Google Drive to store personal and working documents. Google Drive Backup and Recovery software is the best solution for keeping your data safe. Google Drive Advantages All of your documents are always available, no matter where or when a great idea has visited you. Whether you are at work, home or on the go, you can write new or edit existing documents and share them with colleagues.
A dramatic spike in malicious email code that monitors user behavior used in phishing attacks has cost business over $3 billion in recent years. Learn how to discover who's snooping on your email.
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
A slew of MongoDB databases were recently wiped, with attackers demanding Bitcoin payment in exchange for the data, as tracked by Norwegian developer Niall Merrigan and ethical hacker Victor Gevers.
New World Hackers claimed responsibility for the Dyn botnet attack. One of the group's database experts explains how he attacks networks, what happens to stolen data, and the mindset of a hacker.
150
150
Sign up to get articles personalized to your interests!
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
New World Hackers claimed responsibility for the Dyn botnet attack. One of the group's database experts explains how he attacks networks, what happens to stolen data, and the mindset of a hacker.
Securing privacy and data on mobile devices is always a tricky proposition, but with the right combination of settings, apps, and care, iOS users can feel safer.
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Driven by gigabit ethernet, the Personal Internet of Things is breaking open new markets but might also allow hackers into your home. Cybersecurity experts explain how you might be vulnerable.
IBM Watson Health and the FDA recently signed a research initiative looking at ways to leverage the blockchain to safely share sensitive health data, starting with oncology records.
Google recently unveiled its Cloud Key Management Service in beta, which aims to be a scalable solution for management and auditing of encryption keys.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Hackers have taken records of customer information and technical resources from Cellebrite, an organization which sells hardware designed to extract data from secured smartphones.
Cyberweapons, personal data, and corporate secrets are all available on the Dark Web. But where and how is stolen data bought and sold? Our expert hacker lists some of the top illicit online markets.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
BlackBerry's QNX team is preparing to make connected cars and autonomous vehicles highly secure by using virtualization and advanced software. We caught up with the team at CES 2017.
The Internet of Things is arguably the biggest trend of CES 2017, but it's also a massive security risk. BlackBerry's Chief Security Officer explains how it can mitigate the IoT cybersecurity threat.
Today, we are going to explore the damage that Ransomware brings and guide you how to ensure effective Ransomware protection. The Cyber Threat Alliance (CTA) conducted an in-depth study about the virus CryptoWall version 3 (CW3). So, we are sharing their analysis and publishing excerpts of the CryptoWall report: Ransomware is a type of malware that encrypts a victim’s files and subsequently demands payment in return for the key that can decrypt the said files.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
US President-elect Donald Trump will look to former New York City mayor Rudy Giuliani to share insight and expertise on private sector cybersecurity issues.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content