Deception offers an effective way to detect attacks in progress, with no false positives. It alters the balance of power between attacker and target, giving companies the upper hand in combating both external and internal threats.
After outcry over a hollowed-out version, California lawmakers are moving forward with a restored bill to protect state consumers without federal rules.
Will facial recognition technologies mean we will be permanently under surveillance in the future? Should schools and colleges be teaching children how this technology works? Or should we just ignore this technology as if it wasn’t happening? Are there...
HashiCorp adds security features to Consul in a bid to take security-at-scale to a higher level of abstraction.
As many as 175 cases of individuals targeted with dangerous Israeli-made malware, according to one figure. In the latest case, a WhatsApp message laced with the Pegasus spyware was sent to an Amnesty International researcher.
Analyst Patrick Moorhead is making the switch to the Samsung Galaxy S9+. Here are his thoughts.
IBM Chief of Human Resources Diane Gherson shares her best career advice and the future of work.
There is clear enterprise consensus that hybrid cloud is the appropriate long-term strategic approach to best leverage cloud computing. There has been much less consensus in decision-making on the underlying use of public cloud versus private infrastructure for individual...
A malware infection is targeting people's routers and it's forcing them to mine for cryptocurrency.
Fake news, conspiracies, and outright lies (FCL) intended to undermine US institutions and the US culture are exploding in social media. Artificial intelligence (AI) can help identify FCL when they occur and counter-attack in real-time with evidence. ...
A new report from CrowdStrike highlights the growing risk of supply chain attacks and how unprepared most organizations are to detect or respond to them.
Your email inbox can be a dangerous place to navigate, particularly if you don't know how to spot a suspicious message.
Thousands of women who carry mutations in the genes BRCA1 and BRCA2 and joined ‘private’ Facebook groups recently learned that their groups were vulnerable to a Chrome plug-in that allowed marketers to discover group members’ names and other private...
Cryptojacking can no longer operate under the covers. Every CISO must understand the significance of this threat, and rank cryptojacking among the top cyberthreats facing the enterprise. Complacency is no excuse.
U.S. based breaches are the most expensive globally, costing on average $7.91M with the highest global notification cost as well, $740,000. A typical data breach costs a company $3.86M, up 6.4% from $3.62M last year.