The big-name breaches have made us all sensitive to the loss of personal and competitive data. But are we overlooking the real risks? Shawn Henry of CrowdStrike offers insight on how we need to evolve our core defenses.
How will Home Depot's $19.5 million settlement with consumers impacted by its 2014 data breach affect a pending class-action suit filed by banking institutions against the retailer seeking to recoup breach-related expenses?
The Justice Department's appeal of a court order that the government can't compel Apple to unlock an iPhone used by an accused drug dealer is significant because it sets in motion a process that could lead to a Supreme Court ruling on whether mobile device makers must give law enforcement an encryption backdoor.
The modern organisation has recognised the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while others are now just starting to consider these mobility programs. Whether you've already embraced enterprise mobility or are just starting to consider...
The purpose of this research is to understand the economic risk due to the explosive use of mobile devices with access to sensitive and confidential information in the
workplace. In this study, the financial consequences of malware infections and hackers that target employees' devices can be enormous.
Download...
Every year, cybersecurity pundits cast predictions for which issues will make headlines in the year to come. Instead of assessing what the next 365 days
will bring, this report outlines predictions with a three year rolling window.
Download this report to explore changes within
How the PCs and mobile...
Cloud-based cybersecurity solutions increasingly are becoming the best option for securing websites while simultaneously speeding up web page load times for your customers. In addition, cloud-based edge solutions like CloudFlare also block threats through website application firewalls, DNS services and DDoS...
The big companies make the big headlines, but the midsized entities are really the growing attack targets, says Dick Williams, CEO of Webroot. In this video interview, he discusses how new tools and services are serving this expanding market.
DDoS attacks are on the rise, and they come across multiple vectors. In this video interview, Paul Nicholson of A10 Networks describes how organizations can defend against DDoS - and why SSL traffic inspection is a must.
The first case of fully functional ransomware designed to infect and forcibly encrypt Apple OS X systems has been discovered in the wild, researchers at Palo Alto Networks warn.
More cybercriminals are adapting their attack techniques, using compromised credentials linked to privileged accounts to invade networks and systems, according to researchers at Dell SecureWorks, who describe an open source solution that can help mitigate the threat.
Malwarebytes has long been a force in the consumer space, but now its focus is on enterprise breach remediation. In this video interview, Pedro Bustamante explains the enterprise strategy and discusses proactive malware hunting.
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
Apple's standoff with the U.S. government is creating a healthy debate about whether federal investigators, under certain circumstances, should have the right to circumvent the security functions of smartphones and other devices, says cybersecurity attorney Chris Pierson.
Simple conversations live at the heart of business. Migration to SIP enables you to have those conversations with customers, colleagues and partners with far greater reliability and security - and at significantly lower overall costs.
Download this infographic to explore the benefits of SIP and what to expect...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.