Names, email addresses, and some phone numbers belonging to 21 million people exposed in Timehop intrusion; Macy's incident impacts 'small number' of customers.
Take the time to learn about your assets. You'll be able to layer in multiple prevention and detection solutions and have a highly effective security architecture.
Help us with a 10-minute anonymous survey to explore the plans and concerns of defenders of critical enterprise data. One lucky respondent will receive a free pass to @INsecurityCon – October 23-25 in Chicago #INsec18
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.