Greg Touhill: How an Air Force Lieutenant Became One of Cybersecurity’s...

Security Pro File: After leading cyber efforts in the military, DHS, and the federal government, the former Federal CISO now sets his sights on new security technology

Burnout, Culture Drive Security Talent Out the Door

Security's efforts to bridge the talent gap mean little when workers don't want to stay in the industry.

South America the Target of ‘Sowbug’ Cyber Espionage Group

Diplomatic and government organizations in Brazil, Peru, Ecuador, and Argentina are being targeted by what Symantec says looks like a nation-state actor.

Less Than One-Third of People Use Two-Factor Authentication

The number of 2FA users is still lower than expected, but most adopters started voluntarily, researchers found.

Hiring Outside the Box in Cybersecurity

Candidates without years of experience can still be great hires, as long as they are ready, willing, and able.

Majority of US Companies’ DDoS Defenses Breached

Survey finds 69% of companies' distributed denial-of-service attack defenses were breached in the past year - despite their confidence in the mitigation technologies.

4 Proactive Steps to Avoid Being the Next Data Breach Victim

Despite highly publicized data breaches, most companies are not taking the necessary actions to prevent them.

How I Infiltrated a Fortune 500 Company with Social Engineering

Getting into the company proved surprisingly easy during a contest.

Find out how to make your company better prepared for real-world attacks.

It Takes a Buck to Make a Million on the Dark...

The cost for malware tools and services can add up, but the returns from cybercrime campaigns can be enormous, says Recorded Future.

Cognitive Mindhacks: How Attackers Spread Disinformation Campaigns

Researchers investigate the tools and techniques behind cyber propaganda and fake news and how it changes public opinion.

DDoS Flaw Found in Brother Printers

All Brother printers with a Debut Web front-end carry a flaw that allows attackers to distribute a single malformed HTTP POST request, researchers revealed today.

When Ransomware Strikes: 7 Steps You Can Take Now to Prepare

Ransomware is still on the rise.

These operational tips can help lessen the blow if you're hit.