Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

binary neural network - artificial intelligence - machine learning

Review: ImmuniWeb offers true automated penetration testing

Its machine speed allows it to scale, while the human penetration testers ensure complete accuracy.

ransomware breach hackers dark web

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet.

Mobile security

6 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.

spearfishing trap

Russian Cozy Bear APT 29 hackers may be impersonating State Department

Russian Cozy Bear hackers may be impersonating the U.S. State Department in a large, new spear-phishing campaign, plus other cybersecurity news.

Network World: IoT Hacks [slide-05] > Car Talk > Automotive hacks

The 7 deadly sins of endpoint detection & response

Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider.

quell cyber attacks primary

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

computer forensics

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make.

Statue of Atlas against a blue sky and large white clouds.

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

hacker

Cyber criminals abuse US Postal Service Informed Delivery for ID theft

Criminals are abusing the US Postal Service's Informed Delivery for ID theft and fraud. Meanwhile, vulnerabilities were found in Oracle's VirtualBox, WordPress and Adobe ColdFusion servers.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

android anti virus security

Best Android antivirus? The top 13 tools

There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them.

Windows security and protection [Windows logo/locks]

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

malware attack

Worst malware and threat actors of 2018 so far

Researchers name the worst malware and threat actors of 2018 so far, several vulnerabilities were disclosed, and HSBC Bank reveals it suffered a data breach.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

07 vote

Republican Kemp accuses Georgia Democrats of hacking but provides no proof

Georgia’s Secretary of State Office is investigating the Democratic Party of Georgia for hacking the state’s voter registration system but failed to cite any evidence.

cyber attack virus meltdown

Meaner, more violent Stuxnet variant reportedly hits Iran

Iran admitted its “infrastructure and strategic networks” were hit by a meaner version of Stuxnet. Plus, Iran used Google to find CIA communication channels.

Load More