-
Carrier is required to pay $5.5 million, employ two breach specialists in its IT department and conduct audits of its systems yearly.
August 11 -
SOCs devote 50 percent more time than their counterparts on actual threat hunting, according to a new study from McAfee.
August 11 -
Firms should be looking at whether they have the right culture and people in place to understand data and how to best keep it safe.
August 9Corax -
Researchers have seen at least three cyber espionage operations using this technique, says Alexey Shulmin of Kapersky Lab.
August 8 -
The Internet of Things Cybersecurity Improvement Act of 2017 calls for Internet-connected devices to be patchable, meet minimum data safety standards and have changeable password capability.
August 4 -
The rampant proliferation of easy-to-use hacking tools and number of bad actors willing to deploy them means that everyone needs to 'up their game' to stay safe.
July 31CACI International -
Following a cyberattack, the things an organization should not do often go overlooked. Company leaders could end up spreading the fire, rather than smothering it, says John Suit.
July 21 -
A majority of IT professionals still think perimeter security is effective at keeping unauthorized users out of their networks, a new study reveals.
July 12 -
New York law will have ripple effects on insurers around the country.
July 7Novarica -
While many computer systems have been patched up to protect against malware such as WannaCry, this new infection has additional capabilities that let it spread by other means.
June 29