Analyses

dirty numbers playground
salesman coins salary up

clock and calendar montage

February 2017: The month in hacks and breaches

An unsecured MongoDB database, sluggishness about disclosing and patching vulnerabilities, and “I was just curious” were among the contributing factors to the month’s incidents.

Gmail Google Mail

Google prevents 10 million malicious emails every 60 seconds; Gmail users beware

Gmail phishing and malware attacks on Gmail users can be prevented

money

RSAC 2017: The end of easy cash bounties

Industry evolution eliminates chances of bug hunters to get easy cash for trivial vulnerabilities.

insurance

Learn how to get a rate cut on your cyberinsurance

Companies with optimized Microsoft Office 365 security settings may qualify for lower cyberinsurance rates through The Hartford.

bullseye hospital healhcare

Hospital devices left vulnerable, leave patients at risk

A patient lies in a hospital bed waiting for a medical professional to conduct a blood gas analysis. Little does the patient know that his personal information is also undergoing a procedure. The database that stores patient data was...

money case ransom hundreds

To pay, or not to pay, that is the ransomware question

The FBI says don’t pay. Should you heed their advice?

ransomware locked computer stock image cropped

Ransomware 2.0: Anatomy of an emerging multibillion business

What to expect from and how to resist the fastest growing sector of cybercrime in 2017?

robots pc computers army desks work

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

clock and calendar montage

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

kaboom election hacking

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded.

burlap money bag

Cybersecurity's million dollar jobs

Jeremy King says there's some cybersecurity leadership roles at large U.S. corporations offering $1 million compensation packages. The recipients of these big pay packages include military cyber experts making a switch to the...

graduation cap with diploma stacked on books

Where to get a Master’s Degree in cybersecurity

2017 list of universities that offer a Master of Science (M.S.) in cybersecurity.

Group of people waiting for interview

1 million cybersecurity job openings in 2017

cybersecurity job openings, cross train IT workers on cybersecurity

02 hacker

Who's hacking your network?

who is a hacker, data breach and cyber attack diary

security detection monitoring

4 information security threats that will dominate 2017

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2017, information security professionals must understand these four global security threats.

code wave tsunami

World will need to secure 111 billion lines of new software code in 2017

​A little known statistic is arguably one of the most important for CISOs and IT security pros to take note of as they head into 2017.

Stack of school books on desk with an apple on top

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

targets

The human attack surface, counting it all up

As the world goes digital, humans have moved ahead of machines as the top target for hackers.

Load More