Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.
While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.
Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.
Some CISOs may dread presenting to the board of directors. These tips will help ensure it goes well.
Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile security threats are the most problematic for security pros?
Cyber insurance and new approaches to security patches were among topics on the agenda at the recent SC Congress.
Procuring enterprise security technology can be tricky. A government CISO offers nine tips that will help the procurement process go smoothly.
Anthem's recent data breach reveals some things Anthem did right – and some it did wrong. Other enterprises can learn from its actions.
With use of connected devices on rise, enterprises must address IoT security issues from top down, experts say.
Both Apple's iOS and Android have security strengths and weaknesses, experts say.
The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.
Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.
While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.
Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.
In the wake of the Sony scandal, companies may wonder how long to retain email. Hint: The answer is not "forever."
Thorough documentation and clear communication can make dealing with a data breach a little less painful.
While identity and access management is a challenge for all organizations, especially global ones, panelists at the SC Congress event offered tips that can help.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?