Where AI Falls Down in Cybersecurity
Many cybersecurity products claim to incorporate AI in some way, but in some cases, those claims aren't completely accurate.
18 May, 2022 Pam Baker
Many cybersecurity products claim to incorporate AI in some way, but in some cases, those claims aren't completely accurate.
18 May, 2022 Pam Baker
As everyone feels the pain of the skills crunch, what can companies do to secure the talent they desperately need? It comes down to making two key changes.
19 April, 2022 Joseph Zhou
Cyberwarfare is not a future threat—it’s a clear and present danger.
28 December, 2021 C.J. Haughey
"Yanluowang" strain appears to be establishing itself in the cybercrime marketplace, experts say.
2 December, 2021 Jai Vijayan
After several years of back-to-back losses, the company seems set to return to profitability this year.
20 November, 2021 AFP News
Companies now commonly collect security metrics from their software development life cycle, implement basic security measures, and define their obligations to protect user data as part of a basic security strategy.
4 October, 2021 Robert Lemos
Knowing what to ask a potential supplier can minimize risks associated with third-party software vulnerabilities and breaches.
4 August, 2021 Jai Vijayan
Ensuring the CISO's voice is heard by the board will make security top of mind for the business, its employees, and their customers.
2 July, 2021 Vanessa Pegueros
Making sure security teams have adequate resources to invest in frameworks like zero trust and are nuanced in the latest attack methods and vectors will help ensure systems are adequately monitored to thwart potential threats.
23 June, 2021 James Carder, LogRhythm CSO
Cyber threats are staring you in the face, but you can't see them.
8 June, 2021 Matt Shea
Why complementing your SOC's ongoing CTI efforts with advanced threat-hunting analytics is a vital strategy for ensuring cyber resilience.
4 May, 2021 Gilad Zahavi
Traditional data center approaches aren't built for securing modern cloud applications.
5 April, 2021 Praveen Patnala
Power systems, HVAC systems, and other network-connected devices are exposing new vulnerabilities that must be secured.
16 March, 2021 Hervé Tardy
How's your 'Probiv'? How about customer service? Here's how Dark Web forums connect cybercriminals looking for talent with those looking for work -- and which skills are hot right now.
3 March, 2021 Joan Goodchild
Consumer banks, exchanges, payment firms, and card issuing companies around the globe were among those hit.
16 February, 2021 Jai Vijayan
In the face of unprecedented global challenges and the rise of cybercrime, here are five points for boosting your organization's cyber resilience.
3 February, 2021 Stan Wisseman
Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.
22 January, 2021 Kelly Sheridan
Since security intersects so much with privacy, cybersecurity ethics decisions should be on your mind at work.
13 January, 2021 Koen Van Impe
A combination of best practices and best-in-class technology will help keep your enterprise from falling victim to ever-growing threats.
6 January, 2021 Joel Wallenstrom
There's much in store for the future of cybersecurity, and the most interesting things aren't happening on Earth.
23 December, 2020 Pieter Danhieux
Cybersecurity must get to the point where it's equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.
17 December, 2020 Steve Ryan
Understaffed and under fire, companies fail to report cybercrimes even when they are legally obligated to notify authorities, results of a new survey show.
3 June, 2020 Robert Lemos
To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.
12 March, 2020 Robert Lemos
Like the latest security tools on the RSAC show floor, how we choose to communicate about the latest cyberthreats and more can play a key role in improving the security for all on the Internet.
21 February, 2020 Karen Burke
They're especially relevant regarding several issues we face now, including biometrics, secure data management, and human error with passwords.
25 January, 2020 Matt Davey
Security professionals recommend technology to detect attacks that have already infiltrated a network.
08 January, 2020 Joan Goodchild
Security professionals recommend technology to detect attacks that have already infiltrated a network.
30 December, 2019 Robert Lemos
By donating their security expertise, infosec professionals are supporting non-profits, advocacy groups, and communities in-need.
9 December, 2019 Lysa Myers
By donating their security expertise, infosec professionals are supporting non-profits, advocacy groups, and communities in-need.
29 November, 2019 Joan Goodchild
Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.
21 November, 2019 Sara Peters
This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.
11 November, 2019 Menny Barzilay
It's important to work on improving big data analytics in order to address cybersecurity challenges and threats. Here's why it's important.
25 October, 2019 Jonathan Zhang
The gap between the threat capability of modern-day attacks and the skilled personnel able to mitigate them, is perpetually widening. Technology is one way to close the gap.
16 October, 2019 Guy Caspi
There are many cybersecurity mistakes to be aware of int his big data word we're living in. Here are a few very important ones to watch out for.
07 October, 2019 Sean Mallon
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.
30 September, 2019 Robert Lemos
The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues.
17 September, 2019 Craig Hinkley
To best defend against an AI attack, security teams will need to adopt the mindset and techniques of a malicious actor.
10 September, 2019 Nadav Maman
Here's how you can improve cybersecurity with data science to aim for more secure data.
30 August, 2019 Matt James
Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test.
19 August, 2019 Kelly Sheridan
Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.
05 August, 2019 Kelly Sheridan
The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.
20 July, 2019 Beth Burgin Waller
Quantitative measurements - likelihood of loss, hard-dollar financial impact -- are what executives and directors need to make more informed decisions about security risks.
01 July, 2019 Terry Sweeney
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.
17 June, 2019 Curtis Franklin Jr.
Don't let social media become the go-to platform for cybercriminals looking to steal sensitive corporate information or cause huge reputational damage.
23 April, 2019 Guy Bunker
Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security.
10 April, 2019 Liron Barak
In his Black Hat Asia keynote, Mikko Hypponen explored implications of "the next arms race" and why cyber will present challenges never before seen in warfare.
30 March, 2019 Kelly Sheridan
When considering your options for cybersecurity, you'll want to think about using VPNs. They're an excellent possible thanks to machine learning.
11 March, 2019 Diana Hope
When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.
19 February, 2019 Gaurav Banga
The most common vulnerabilities seen last year run the gamut from cross-site scripting to issues with CMS platforms.
21 January, 2019 Curtis Franklin Jr.
The sheer number of cyberattacks resulting from an inability to manage risks — and the burgeoning talent shortage to deal with it — will force CIOs to rethink their defense strategy.
7 January, 2019 Marc Wilczek
While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn't put to rest.
22 December, 2018 Phillip Maddux
Getting to cyber resilience means federal agencies must think differently about how they build and implement their systems. Here's where to begin.
10 December, 2018 Gus Hunt
For too long, cybersecurity has been looked at as one team's responsibility. If we maintain that mentality, we will fail.
Leaders around the globe are not naive regarding the impact cyberattacks have on a business.
26 November, 2018 Troy Mattern
It's no secret that ransomware and distributed denial-of-service attacks are on the rise. In fact, compared with the previous year, the average number of targeted cyberattacks per organization in 2017 more than doubled (232 through January 2018 versus 106 through January 2017).
07 November, 2018 Marc Wilczek
While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources provided in the policies make the investment worthwhile.
31 October, 2018 Blair Shiver
If a company or individual is powerful, they are vulnerable to a dangerous cyber attack, and that's where we come in.
17 October, 2018 Alex Hinchliffe
The analysis of file systems is a fundamental step in every forensic investigation. Long-known file systems such as FAT, NTFS, or the ext family are well supported by commercial and open source forensics tools.
24 September, 2018 Cyber Forensicator
The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.
The Trump administration has authorized the use of "offensive cyber operations" against foreign enemies.
24 September, 2018 Dark Reading
In 2018, mobile communication platforms such as WhatsApp, Skype, and SMS have far less protection against app-based phishing than email.
Mobile phishing is a topic that just won't go away.
24 September, 2018 Dan Cuddeford
Copyright © 1996 - 2022 ZOOM CyberSense. All Rights Reserved.