Ransomware attackers collected an average of around $84,000 from victim organizations, up from $41,000 in Q3 of 2018, Coveware says.
Privacy-mature companies complete sales more quickly, have fewer and less serious breaches, and recover from incidents faster, according to Cisco's annual survey.
There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives.
The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.
Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.
In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says.
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.
Emotet is considered one of the most damaging banking Trojans, primarily through its ability to carry other malware into an organization.
A new document separates cloud vulnerabilities into four classes and offers mitigations to help businesses protect cloud resources.
Expect cache attacks to get worse before they get better. The problem is that we don't yet have a good solution.
CISA has released an advisory for six high-severity CVEs for GE Carescape patient monitors, Apex Pro, and Clinical Information Center systems.
A general approach to privacy, no matter the regulation, is the only way companies can avoid a data protection disaster in 2020 and beyond.
Attackers 'weaponized' Active Directory to spread the ransomware.
For all the cautions against doing so, one-third of organizations in a Proofpoint survey said they paid their attackers after getting infected with ransomware.
New research finds security operations centers suffer high turnover and yield mediocre results for the investment they require.
An attack chain of vulnerabilities in ConnectWise's software for MSPs has similarities to some of the details of the August attack on Texas local and state agencies.
Recent data protection laws mean that the data protection officer and CISO must work in tandem to make sure users' data is protected.
Some the records, found on five identically configured servers, might have contained data in clear text.