The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.
If the now-retired Air Force Brigadier General and first-ever GE CSO ever got the memo about career specialization and 'nichey' expertise, he apparently forgot to read it.
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.
Are you ready for a DDoS attack on your network -- or on your service provider's network - or is it time to update your resilience, remediation and recovery plan? In this webinar, learn strategies that will make your business ...
In this Dark Reading webinar, experts discuss methods for using network segmentation and microsegmentation as part of your organization's strategy for limiting the effects of an online compromise.
We are seeking your input for an important survey about the role of the IT security or the cybersecurity professional. Participate and get a chance to enter a drawing for 1 of 10 $50 Amazon gift cards.
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.