The Minefield of Corporate Email Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.
Apple Pledges Privacy, Beefs Up Security The company hits back at the data economy - and fellow tech giants Facebook and Google - by announcing its own single sign-on service. A host of other iterative security improvements are on their way as well.
SQL Injection Attacks Represent Two-Third of All Web App Attacks When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows.
'Lone Wolf' Scammer Built a Multifaceted BEC Cybercrime Operation A one-man 419 scam evolved into a lucrative social-engineering syndicate over the past decade that conducts a combination of business email compromise, romance, and financial fraud.
What 3 Powerful GoT Women Teach Us about Cybersecurity Imagine Game of Thrones' Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security.
Predicting Vulnerability Weaponization Advances in data science are making it possible to shift vulnerability management from a reactive to a proactive discipline.