The Impact of a Security Breach 2017

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises ...

[Strategic Security Report] Assessing Cybersecurity Risk

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluat...

Updates to NotPetya Lead to Server Seizure at Ukrainian Software Firm

Police seized servers from Ukraine's Intellect Service as the country scrambles to control a cyberattack allegedly conducted by advanced hackers.

‘Crackas With Attitude’ Hacker Sentenced for Targeting Government Officials

A North Carolina man known as 'Incursio' goes to prison for hacking government systems as well as senior government officials.

Researchers Build Firewall to Deflect SS7 Attacks

Security researchers will release an open-source SS7 firewall at Black Hat USA that aims to bolster security of mobile operators' core networks.

Avoiding the Dark Side of AI-Driven Security Awareness

Can artificial intelligence bring an end to countless hours of boring, largely ineffective user training? Or will it lead to a surveillance state within our information infrastructures?

The Problem with Data

The sheer amount of data that organizations collect makes it both extremely valuable and dangerous.

Business leaders must do everything possible to keep it safe.

8 Things Every Security Pro Should Know About GDPR

Organizations that handle personal data on EU citizens will soon need to comply with new privacy rules.

Are you ready?

8tracks Hit With Breach of 18 Million Accounts

Hackers attack Internet radio user database, gaining access to email addresses and encrypted passwords.

Vulnerabilities Found in German e-Government Communication Library

Researchers find critical flaws in secure communications protocol used in areas including population registration, justice and public health systems.

US Tech Companies Argued to Maintain Russia Spy Agency Ties

US technology companies lobbied the US government to create exceptions for a ban on business relationships with Russia's Federal Security Service.