By Jai Vijayan Contributing Writer โ October 13th 2020 at 18:45
With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.
By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA โ October 13th 2020 at 16:00
Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.
By Brad Brooks CEO of OneLogin โ October 13th 2020 at 14:00
It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.
By Robert Lemos Contributing Writer โ October 12th 2020 at 19:20
Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.
By Hudson Bloom, Senior Consultant, Application Security, Optiv: End-to-end encryption is a style of encrypted connection in which... โ October 12th 2020 at 18:30
Many services advertise E2EE, but not all of them actually offer it.
By Steve Zurier Contributing Writer โ October 12th 2020 at 14:00
With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.
By Robert Lemos Contributing Writer โ October 8th 2020 at 21:50
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.
By Chris Hoff Product Marketing Manager, ReversingLabs โ October 8th 2020 at 18:00
Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.
By Kelly Sheridan Staff Editor, Dark Reading โ October 7th 2020 at 22:00
Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.
By Robert Lemos Contributing Writer โ October 7th 2020 at 20:05
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.
By Satya Gupta Executive Co-Founder & CTO, Virsec โ October 7th 2020 at 18:00
The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.