Mistakes and missteps plague enterprise security. The Verizon 2017 Data Breach Investigations Report (DBIR) offers nuggets on what organizations must stop doing - now.
Employees who reuse logins on multiple websites drive the impact of third-party breaches as hackers use credential stuffing to compromise more accounts.
Attackers have been using NSAs EternalBlue and Double Pulsar to distribute AdylKuzz cryptocurrency malware to hundreds of thousands of systems, Proofpoint says.
The next generation of situation-aware malware will use AI to behave like a human attacker: performing reconnaissance, identifying targets, choosing methods of attack, and intelligently evading detection.
In this webinar, security experts discuss methods for doing better security with fewer people, including: Time-saving tools for automating security functions, effective ways to use outsourcing and third-party services, creative places to look for new talent and the best ways ...
Join us as the author of the book "Everydata: The Misinformation Hidden in the Little Data You Consume Every Day" examines common ways data is misrepresented or misinterpreted, the limitations of forecasts and predictions, and how to recognize "Tells" in ...
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack.
Spam is a multi-platform, multi-vector approach to network compromise, and organizations need to weigh up the risks on all fronts to be able to combat it successfully.
This new survey conducted by UBM and Sumo Logic highlights the need for visibility into and intelligence about the full IT application stack. Read the report today!
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.