Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
US/North America News Reporter, Infosecurity Magazine
IoT products must come out of the gate with easy and natural security that doesn’t rely on consumer awareness.
Rather than simply copying the Zeus trojan "as-is,” Floki Bot has new capabilities making it an even more attractive tool for criminals.
Legal firms, as a sector, are now about even with the retail industry when it comes to being targeted by hackers.
There are more than 16.5 million visits per month to the top 100 pirate IPTV supplier websites.
What contributes to employee dissatisfaction? Hint: It’s not about the money.
Phishing as a service and turnkey phishing are the key drivers of the overall increase in phishing attacks.
It's a method to gather information from a device and show high resolution results of finger touch areas over time.
This is an increase of 13,000 from the amount in 2015, and a significant jump from the 70,000 files per day identified in 2011.
Articulating risk to senior management and enabling decision-making is a meta-leadership problem.
Managing the transition to becoming a smart city is an exercise in information-sharing and meeting hyperconnectivity challenges.
The 13-member board provides strategy, governance and oversight, grants certifications and enforces the ethics code.
Respondents still prioritize security as the top concern, followed by cost.
After training for a year on the language of cybersecurity, the AI engine is entering a beta phase with 40+ security teams.
The Malaysian Digital Economic Corporation (MDEC) and PGI will develop a cybersecurity academy in Malaysia.
A comprehensive report calls for establishing a national cybersecurity workforce program and setting international rules of engagement.