What Enterprises Can Learn from Medical Device Security

In today's cloud-native world, organizations need a highly distributed approach that ties security to the workload itself in order to prevent targeted attacks.

Tips for Writing Better Infosec Job Descriptions

Security leaders frustrated with their talent search may be searching for the wrong skills and qualifications.

Microsoft Word Vuln Went Unnoticed for 17 Years: Report

Researchers claim Microsoft Word vulnerability CVE-2017-11881, patched today, has existed for 17 years.

Lazarus Group, Fancy Bear Most Active Threat Groups in 2017

Lazarus, believed to operate out of North Korea, and Fancy Bear, believed to operate out of Russia, were most referenced threat actor groups in last year's cyberattacks.

Apple, Cisco, Allianz, Aon Partner in Cyber Risk Management

The four companies announced a tool for managing the cyber risk of ransomware and other malware-related threats.

Deception Technology: Prevention Reimagined

How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.

NIST Releases New Cybersecurity Framework Draft

Updated version includes changes to some existing guidelines - and adds some new ones.

McAfee Looks to Cloud with Skyhigh Acquisition

McAfee agrees to buy CASB provider Skyhigh Networks, demonstrating a strong focus on cloud security.

8 Out of 10 Employees Use Unencrypted USB Devices

Security policies for USB drivers are severely outdated or inadequate, a report finds.

Siemens Leads Launch of Global Cybersecurity Initiative

The new 'Charter of Trust' aims to make security a key element of the digital economy, critical infrastructure.

Stripping the Attacker Naked

How cyber threat intelligence can help you gain a better understanding of the enemy and why that gives security teams the upper hand.