With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts?
Cloud-based API service stores and manages sensitive consumer data with a zero-trust, database-as-a service approach.
Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues...
Phishing ratings, security ratings, human-ness ratings -- we are looking at a future filled with grades of security and trustworthiness. But there is a downside.
Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters.
Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long?
The economic impact of bot traffic can be unexpectedly substantial, a PerimeterX-commissioned study finds.
The shift of moving telecommunications networks toward more commercial networking equipment and systems also expanded their attack surface.
Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web.
By committing to independent testing to determine value, vendors will ensure that their products do what they say they do.
With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake.
Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.
The long debate over whether encryption and anonymity shield too much criminal behavior also has staged a resurgence.
Researchers shows most "flight-risk" employees planning to leave an organization tend to start stealing data two to eight weeks before they go.
Why making every front-end developer a DevSecOps expert will lead to a more holistic approach to web and native application security.
In contrast, Q1 2019 saw more interest in selling and buying access to individual servers.
A new security advisory addresses a vulnerability that could be exploited to cause a denial-of-service attack.
As COVID-19-themed spam rises, phishing-not so much. An analysis of newly registered domains finds that only 2.4% are actually phishing sites aiming to steal credentials.
Enterprises need to recognize that remote access and other pandemic-related security challenges cannot be fixed with buzzwords or silver-bullet security tools.
The FBI has warned ecommerce sites about attacks targeting a more than three-year-old flaw in the Magmi mass importer.