Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Verizon's Data Breach Investigations Report 2020 highlights the leading causes of breaches last year, including credential theft, phishing, ransomware as well as → Read More
Healthcare institutions and non-profits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up → Read More
he quality of authentication provided by behavioral biometrics is improving, says James Stickland, CEO of Veridium. Nevertheless, he says, "we haven't reached → Read More
The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface. And as a result, the definition of threat → Read More
Identifying the data gaps in the rapidly expanding attack surface is critical to allow more sophisticated preventative, detective response capabilities, says Kory → Read More
The information provided in a domain name system is far deeper than just those transactions that take place. A DNS provides much more granular information around → Read More
Insider threats continue to be difficult to detect, says Ashish Thapar of Verizon, who offers a summary of a new report on these threats.. BankInfoSecurity → Read More
With the advent of the internet of things, authentication needs to be far more scalable than it ever was in the past, says Phillip Dunkelberger, CEO, Nok Nok Labs. → Read More
Web application firewalls usually have not been a part of the DevSecOps conversation, but that's changing, says Andrew Peterson of Signal Sciences. → Read More
Getting a telemetry stream back from applications can help organizations to "adjust much more quickly to see how practical attacks are happening on the → Read More
Machine learning systems adapt their behavior on the basis of a feedback loop, so they can overlearn and develop blind spots, which if not understood by → Read More
“Security by design” is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee → Read More
Machine learning models and artificial intelligence are transforming the way email is secured, says Adrien Gendre of Vade Secure.. bank information security → Read More
How can enterprises couple automated processes with human intelligence to improve threat detection? Brian NeSmith of Arctic Wolf shares insights. → Read More
The lack of standardization is one of the significant challenges when securing OT environments. Customizing and aligning OT security with the business is key, says → Read More
Credential abuse attacks and identity theft incidents are rising, with attackers leveraging botnets to launch coordinated campaigns with high success rates, says → Read More
While unsupervised machine learning techniques get away from the data labeling and classification that most supervised systems require, they are dependent on the → Read More
Identity and access management is not about compliance anymore - It's really about security, says Gartner's Felix Gaehtgens. With cloud, virtualization, DevOps and → Read More
Protecting "East-West" cloud traffic - the traffic between apps and virtual machines - is a significant challenge, but microsegmentation can help address → Read More
With so much focus on endpoint security, it's important not to overlook the importance of network-level security controls, says Lawrence Orans, research vice → Read More