Please turn on your JavaScript for this page to function normally.
idea
CISO priorities: Implementing security from the get-go

Dr. David Brumley, CEO of ForAllSecure, a Carnegie Mellon computer science professor (on leave), and part of the team that won the DARPA Cyber Grand Challenge, was, at one …

Laptop
Cybersecurity in the age of the remote workforce

With the advent of cloud services and the proliferation of high end mobile devices (think iOS devices and Android phones), the workforce is moving inexorably to a mobile one …

danger
Fileless attacks designed to disguise malicious activity up 265%

Trend Micro published its roundup report for the first half of 2019, revealing a surge in fileless attacks designed to disguise malicious activity. Detections of this threat …

Qualys
Knowing what’s on your hybrid-IT environment is fundamental to security

In this Help Net Security podcast recorded at Black Hat USA 2019, Shiva Mandalam, VP of Products, Visibility and Control at Qualys, talks about the importance of visibility. …

hand
What can be done about the rising click interception threat?

Ad networks’ increasingly successful efforts to detect bot-based ad click fraud has forced attackers to focus more on intercepting and redirecting legitimate users’ …

biohazard
New ransomware grows 118% as cybercriminals adopt fresh tactics and code innovations

McAfee Labs saw an average of 504 new threats per minute in Q1 2019, and a resurgence of ransomware along with changes in campaign execution and code. More than 2.2 billion …

drown
SOCs still overwhelmed by alert overload, struggle with false-positives

Security Operations Center (SOC) analysts continue to face an overwhelming number of alerts each day that are taking longer to investigate, leading five times as many SOC …

Stellar Repair for Exchange
Product showcase: Stellar Repair for Exchange

Recovering from a corrupt Microsoft Exchange Server database or restoring a mailbox from an old Exchange database can be very tricky and, depending on the damage, an …

Imperva
Imperva discloses security incident affecting Cloud WAF customers

Imperva, the well-known California-based web application security company, has announced that it has suffered a “security incident” involving its Cloud Web …

college
What the education industry must do to protect itself from cyber attacks

Data breaches show no signs of slowing down and companies across many industry verticals fall victim to what now seems to be a regular occurrence. Most attention around data …

password
How passwords paved the way for new technology

On July 15 we lost a major contributor to modern-day IT security – Dr. Fernando Corbato, the inventor of the password. Back in the early 1950s, computers could only do …

money
Cost of data breaches to surpass $5 trillion in 2024

A new report from Juniper Research found that the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024, an average annual growth of 11%. This …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools