New Method Proposed for Secure Government Access to Encrypted Data

'Crumple Zones' in crypto mechanisms can make it possible - but astronomically expensive - to access encrypted data, say researchers from Boston University and Portland State University.

Russian APT Compromised Cisco Router in Energy Sector Attacks

DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.

Half of Cyberattacks in the Middle East Target Oil & Gas...

Nearly one-third of all cyberattacks worldwide are against operations technology (OT), or industrial networks, a new report by Siemens and The Ponemon Institute shows.

Microsoft Offers New Bug Bounties for Spectre, Meltdown-Type Flaws

Microsoft is offering a short-term bug bounty program for speculative execution side-channel vulnerabilities and threats.

A Data Protection Officer’s Guide to the GDPR Galaxy

Impending deadline got you freaking out? These five tips might help you calm down, at least a little.

Cybercriminals Launder Up to $200B in Profit Per Year

Cybercrime funds make up 8-10% of all illegal profits laundered and amount to $80-200 billion each year.

Phantom Secure ‘Uncrackable Phone’ Execs Indicted for RICO Crimes

Executives of Phantom Secure have been indicted on federal RICO charges for encrypting communications among criminals.

Who Does What in Cybersecurity at the C-Level

As security evolve as a corporate priority, so do the roles and responsibilities of the executive team.

These seven titles are already feeling the impact.

Google Rolls Out New Security Features for Chrome Enterprise

The business-friendly browser now includes new admin controls, EMM partnerships, and additions to help manage Active Directory.

The Containerization of Artificial Intelligence

AI automates repetitive tasks and alleviates mundane functions that often haunt decision makers.

But it's still not a sure substitute for security best practices.

Are DDoS Attacks Increasing or Decreasing? Depends on Whom You Ask

Details on DDoS trends can vary, depending on the reporting source.

Microsoft Report: Cybersecurity’s Top 3 Threats Intertwine

Botnets, ransomware, and simple attack methods dominate the threat landscape and build on each other to drive effectiveness.