- Why Cybersecurity Burnout Is Real (and What to Do About It)
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.
- New Free Tool Scans for Chrome Extension Safety
CRXcavator scans extensions in real time based on factors including permissions, external calls, and third-party libraries.
- Cyber Extortionists Can Earn $360,000 a Year
Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.
- Security Analysts Are Only Human
SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.
- Insurer Offers GDPR-Specific Coverage for SMBs
Companies covered under the EU mandate can get policies for up to $10 million for fines, penalties, and other costs.
- As Businesses Move Critical Data to Cloud, Security Risks Abound
Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.
- POS Vendor Announces January Data Breach
More than 120 restaurants were affected by an incident that exposed customer credit card information.
- Mastercard, GCA Create Small Business Cybersecurity Toolkit
A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.
- 9 Years After: From Operation Aurora to Zero Trust
How the first documented nation-state cyberattack is changing security today.
- Microsoft Expands AccountGuard to Help Europe Prep for Cyberattacks
A recent wave of cybercrime has targeted organizations with employees in Belgium, France, Germany, Poland, Romania, and Serbia.
- The Anatomy of a Lazy Phish
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.
- Prep for The Next Cybersecurity Arms Race at Black Hat Asia
Don't miss out on some of the world-class Briefings and Trainings on offer for cybersecurity professionals concerned about the most pressing threats of 2019.
- 'Formjacking' Compromises 4,800 Sites Per Month. Could Yours Be One?
- North Korea's Lazarus Group Targets Russian Companies For First Time
In an unusual development, the group known for its attacks against companies in countries viewed as geopolitical foes is now going after companies in a country considered an ally, Check Point Software …
- Google Research: No Simple Fix For Spectre-Class Vulnerabilities
Chip makers' focus on performance has left microprocessors open to numerous side-channel attacks that cannot be fixed by software updates – only by hard choices.
- 19 Minutes to Escalation: Russian Hackers Move the Fastest
New data from CrowdStrike's incident investigations in 2018 uncover just how quickly nation-state hackers from Russia, North Korea, China, and Iran pivot from patient zero in a target organizatio …
- Making the Case for a Cybersecurity Moon Shot
There are severe and unsolved problems in our industry that justify a sustained effort and substantial investment. It's worth picking one.
- 6 Tax Season Tips for Security Pros
Here are some practical ways to ensure your company's safety as Uncle Sam comes calling.
- Breach in Stanford System Exposes Student Records
A wide variety of data was visible through the vulnerability.
- Palo Alto Networks to Buy Demisto for $560M
This marks Palo Alto Networks' latest acquisition and its first of 2019.