The Check Point Software Technologies’ security report states that 77 percent of CISOs expressed concern that their organizations aren’t equipped to handle these modern day attacks.
Online Trust Alliance spells out best practices for testing, purchasing, networking and updating IoT devices to make them and the enterprise more secure.
With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.
Your weekly update of everything security!
Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.
The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe.
Lack of cybersecurity safeguards in fintech companies has raised serious concerns, especially with the implementation of EU’s GDPR in May 2018.
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Cisco's Tetration-V and Tetration-SaaS give businesses interested in the security-analytics platform the option of a cloud service or software that runs on virtual appliances.
The experts at Kaspersky Lab found evidence showing that criminals are adding mining capacities into legitimate applications and spreading them under the guise of football broadcasting and VPN applications
In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.
Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.