AuthorCurtis Franklin Jr. Senior Editor at Dark Reading
A report by the Wall Street Journal points finger at group that is know to Facebook Security.
The same traits that make collaboration systems so useful for team communications can help hackers, too.
A recently discovered issue with a common file access method could be a major new attack surface for malware authors.
Speaking at the Gartner Symposium/ITxpo, analyst Peter Firstbrook's list of trends is likely to inform executive committee conversations for the next 12 months.
Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.
Artificial intelligence (AI) holds the promise of easing the skills shortage in cybersecurity, but implementing AI may result in a talent gap of its own for the industry.
Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.
If true, the attack using Supermicro motherboards could be the most comprehensive cyber breach in history.
Authentication weakness in Apple's DEP could open a window of opportunity for attackers.