Analysis

Trends and Analysis

Machine Learning in Security: 4 Factors to Consider

Key factors to consider before adding machine learning to your security strategy.

Nigerian Convicted in Passport Wire Fraud and Internet Scam

A Nigerian man set up a number of U.S. bank accounts with bogus passports over a one year period, in which he managed to steal at least $500,000 through wire fraud and Internet scams.

The Hidden Dangers of Component Vulnerabilities

Dangerous flaws in open source components and dependencies lurk within most applications today.

Exploits Targeting Corporate Users Surged Nearly 30% In 2016

At same time, number of attacks targeting software vulnerabilities in systems used by consumers declined over 20%, Kaspersky Lab says in new report.

Best Practices for Securing Open Source Code

Attackers see open source components as an obvious target because there's so much information on how to exploit them.

These best practices will help keep you safer.

6 Times Hollywood Got Security Right

Hollywood has struggled to portray cybersecurity in a realistic and engaging way. Here are films and TV shows where it succeeded.

Kill Chain & the Internet of Things

IoT "things" such as security cameras, smart thermostats and wearables are particularly easy targets for kill chain intruders, but a layered approach to security can help thwart an attack.

Fake Delta Airlines Receipt Packs Malware

Phishing emails, disguised as receipts from Delta Airlines, trick victims into downloading malware.

Cutting through the Noise: Is It AI or Pattern Matching?

Many vendors are fudging terms when trying to sell their artificial intelligence security systems. Here's what you need to know when you buy.

APT Attack Activity Occurs at ‘Low, Consistent Hum,’ Rapid7 Finds

Organizations in industries aligned to nation-state interests are main targets of nation-state attack threats, new quarterly threat report shows.

Users Overshare Sensitive Enterprise Data

Survey finds nearly half of the employees trained to protect sensitive data engage in risky security practices.

3 Tips for Updating an Endpoint Security Strategy

How to face the process of navigating new threats, tools, and features to build an effective endpoint security strategy.