Network Access Control: Restricting and Monitoring Access to Your Network and Data

Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.

The best cybersecurity comes in layers, making it difficult or frustrating for an intruder to fight through each line of defense to break into the network and gain access to data. One of the front-line … more »

Apple Attributes Alleged iCloud Hack to Password Reuse

The allegedly compromised account information may have come from the LinkedIn breach.

GoDaddy Acquires WordPress Security Vendor Sucuri

Hosting provider aims to deliver even more security services to its clients as it expands services portfolio.

Security Flaws Found in LastPass Extensions for Chrome, Firefox

The vulnerabilities, uncovered by security researcher Tavis Ormandy, were patched quickly.

Incident Response: How to Prepare for Attacks and Breaches

Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.

TrackVia Combines Low-Code Apps with Security Best Practices

The drive to digital transformation encourages use of low-code application development platforms, but these tools often overlook security, leaving enterprises exposed to unknown threats. TrackVia injects security back into the application development equation using a low-code platform that speeds development yet institutes protection.

Saks Fifth Avenue, Three U.K. Mistakenly Expose Customer Data

In both cases, the information appears to have been exposed by mistake, not by an external or internal attack.

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Beware of Sleeper Fraud Accounts

Datavisor Online Fraud report finds that a non-trivial percentage of fraud activity occurs from accounts that are inactive for a week before an attack.

MajikPOS Malware Currently Infecting U.S. Point-of-Sale Systems

The malware began infecting businesses across North America in late January.

Understanding Ransomware Vectors Key to Preventing Attack

Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.

Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.