As authentication options blossom, startup tries to simplify deployment, maintain flexibility
A startup with a strong pedigree is trying to address the problem that businesses have keeping up with the ever-increasing options for authentication.
A startup with a strong pedigree is trying to address the problem that businesses have keeping up with the ever-increasing options for authentication.
It took less than a week for criminals to drain virtually all publicly exposed MongoDB servers of their data, and now a second tier of opportunistic thieves is trying to walk off with the ransom.
Fortinet is adding Cisco, HPE and Nokia to its stable of partners whose security gear can share information with Fortinet products to improve overall security.
A $1 billion Russia-based criminal gang has been bilking online advertisers by impersonating high-profile Web sites like ESPN, Vogue, CBS Sports, Fox News and the Huffington Post and selling phony ad slots, but that’s about to end.
Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black.
Adultery dating service submits to 20 years of federal auditing of its information security.
Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet.
As some of the tech sector’s heaviest hitters prep for a meeting this week with president-elect Donald Trump, they need to make sure they get answers to critical questions about issues that could affect not only their businesses but the U.S. economy in general.
Donald Trump’s effect on cybersecurity after he’s sworn in as president will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.
12 cyber shopping tips because criminals will be using all the attacks they can this holiday season in order to score cash and gather valuable personal data that they can monetize later.
Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday and Cyber Monday retailing into profits for themselves, according to security experts.
Attackers who were trying to turn the Ask.com Toolbar into a malware dispensary got caught early on when their scheme was picked up by security services that were looking for anomalies.
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.
The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.
Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions.