Microsoft strengthens Windows 10 security with measures to prevent, detect, and respond to ransomware attacks. But they are only useful for businesses using all the right tools.
For cyber intelligence sharing to work, organizations need two things: to trust each other and better processes to collect, exchange and act on information quickly.
Less than six hours after Donald Trump was named President-Elect of the US, Cozy Bear/APT29/CozyDuke nation-state hackers kicked off waves of spearphishing attacks.
Which metrics are the best indicators of a strong cybersecurity team? Experts say security pros should be recording and reporting these data points to demonstrate their success.
Mega compromises at federal and state agencies over the past three years has compromised everything from personal data on millions to national security secrets.
With continuous deployment of micro-services and Docker containers becoming mainstream, it's imperative that security initiatives include security scanning and monitoring. Increasingly, known open source vulnerabilities have been the "way in" for attackers. This is a major concern for organizations worldwide ...
In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted "spearphishing" attacks. You'll get insight on how the attackers choose their social engineering targets, the methods ...
Cybersecurity spending is at an all-time high, according to many industry estimates, but that rapid increase in spending apparently is not having much impact on the salaries of security professionals. Our report asks the question: Is there more to an ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.