What is the biggest threat from the Equifax breach? Account takeovers
Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?
Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?
Enterprises that rely on the DNSSEC protocol need to update their name servers before Oct. 11 with the new root zone key signing key or risk having DNSSEC validations fail.
As more companies adopt better encryption practices, cyber criminals are turning to SSL/TLS vulnerabilities to deliver malicious attacks.
The realities of managing and protecting IT infrastructures puts IT and security personnel in a no-win situation when attacks like WannaCry or ExPetr occur, so stop blaming them.
The latest campaigns are bigger, more sophisticated, and causing far more damage as the attackers learn new techniques and collaborate with other groups
Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy
The tools would let attackers remotely take over any Solaris system around the world
All SSL certs are not created equal, and web browsers make matters worse by not clearly showing what security you’re actually getting
Researchers found commonalities between tools used against Solaris 20 years ago and modern-day attacks deployed against Windows PCs
Safeguard the software you develop from the start with these Jenkins plug-ins and integrations, which automate security testing
New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure
The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou
Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe
High-profile breaches are just the tip of the iceberg. Many have never been detected or disclosed--and without a major infrastructure changes it's only going to get worse
Despite all the bad news in information security in 2016, some positive developments may finally shift momentum