Dark
IT Leaders Consider Security Tech a Part of Business TransformationNew!!

Security makes the top 10 list of technologies changing how organizations operate, an indicator of how information security is increasingly viewed as a strategic business initiative....

Read more
Dark
Fraud Is On the Rise, and It's Going to Get WorseNew!!

The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud....

Read more
Dark
REvil Ransomware Gang Arrests Trigger Uncertainty, Concern in Cybercrime ForumsNew!!

Threat actors from Eastern Europe seen expressing some concern about Russia being a safe place for them to continue operating, researchers say....

Read more
Dark
Looking Beyond Biden's Binding Security DirectiveNew!!

Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners....

Read more
Dark
Biden Broadens NSA Oversight of National Security SystemsNew!!

New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says....

Read more
Dark
(ISC)² Appoints Jon France, CISSP, as Chief Information Security OfficerNew!!

Accomplished cybersecurity leader will advocate globally for best practices in risk management and head up association security operations....

Read more
Dark
Researchers Discover Dangerous Firmware-Level RootkitNew!!

MoonBounce is the latest in a small but growing number of implants found hidden in a computer's Unified Extensible Firmware Interface (UEFI)....

Read more
Dark
Automating Response Is a Marathon, Not a SprintNew!!

Organizations should balance process automation and human interaction to meet their unique security requirements....

Read more
Dark
FireEye & McAfee Enterprise Renamed as TrellixNew!!

Symphony Technology Group announces a name for the newly merged company, which aims to become a leader in extended detection and response (XDR)....

Read more
Dark
What Happens to My Organization If APIs Are Compromised?New!!

Once attackers have obtained access, they can compromise other systems or pivot within your networks....

Read more