Loading...
The day's top cybersecurity news and in-depth coverage
January 19, 2021
The new capabilities in the Intel mobile processors will make it harder for ransomware to avoid detection. Read more â¶
Email attackers are increasingly disguising as trusted collaboration tools like Teams and Zoom to deploy malware or steal credentials. One such attack was recently detected and stopped by AI, which revealed the true source of the email.
Jeff Thomas is CSO of Prudential Financial where his team created a CSO50 award-winning workplace threat management training course designed to capture employee attention and maintain interest. The solution combines a story with a graphic novel look-and-feel and an interactive game -- all designed to educate and motivate learners to recognize and report behaviors of concern observed in the workplace. Learn how this interactive storytelling approach drives engagement.
More cybersecurity funding for states and Capitol, new breach reporting rules, and ransomware-related bills will likely be on the agenda for the 117th Congress.
CISOs talk about how they identify when they need a new security strategy and the process of developing it and selling the reboot to stakeholders.
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.
Trojan malware comes in many different types, but all require a user action to initiate.
© 2024