Network Security 

Must You Use Microsoft's In-Box DNS?

Active Directory does not require Microsoft DNS to function properly. In fact, organizations can enjoy security benefits by using non-Microsoft DNS.

52 Percent of Hackers Would Help the FBI Hack the iPhone for a Fee

And nine percent would do it for free, a recent survey found.

Just 30 Percent of Organizations Feel Ready to Handle IoT Security Risks

Still, 47 percent expect the number of IoT devices on their networks to increase by at least 30 percent next year.

66 Percent of IT Pros Say Privileged Users Access Sensitive Data Simply Out of Curiosity

And 74 percent think privileged users believe they're empowered to access all the information they're able to view, a recent survey found.

7 Database Security Best Practices

Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.

Credit Card Breach Hits All Eddie Bauer Stores in U.S., Canada

Names, card numbers, security codes and expiration dates were accessed.

How DevSecOps Will Change Security

DevSecOps will become a common thread in every enterprise security approach, opines Mike Kail, co-founder and chief innovation officer of Cybric.

Sage Employee Arrested for Insider Breach

The breach may have exposed the personal information of employees at 280 companies.

Should Enterprise Security Software Be under Warranty?

Should enterprise security software offer warranties, much as consumer products and services do?

Using a Neural Network to Improve Social Spear Phishing

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

Point-of-Sale Breach Hits Hyatt, Marriott, InterContinental, Starwood Hotels

Customer names, account numbers, expiration dates and verification codes may have been accessed.

MICROS Hackers Hit Five More POS Companies

The hackers targeted weaknesses in the vendors' servers, then attempted to steal login information and use it to access retailers' POS systems.

How to Mitigate Fourth-Party Security Risks

What do you know about your vendors' vendors? Fourth-party security risks can be serious. How can you mitigate them?

62 Percent of Employees Have Access to Data They Shouldn't Be Able to See

And 76 percent of organizations have experienced the loss or theft of data in the past two years, a recent survey found.

Russian Hackers Hit Oracle's MICROS POS

It's not yet clear how many customers may be affected.

Advocate Health Care to Pay Record-Breaking $5.55 Million Fine for Data Breach

'We hope this settlement sends a strong message,' OCR director Jocelyn Samuels said.

3.7 Million People Affected by Massive Data Breach at Banner Health

A wide range of information was exposed, from credit card numbers to patient data.

71 Percent of IT Pros Say Cyber Security Skills Shortage Causes Damage to Organizations

And 82 percent admit to a shortage of cyber security skills, a recent survey found.

88 Percent of All Ransomware Targets the Healthcare Sector

The education sector comes second at 6 percent, according to a recent report.

Authentic8 Advances Disposable Browser Security Model

Scott Petry, co-founder and CEO of Authentic8, talks about his past with Postini and how his new startup is the future of online security. [VIDEO]



Only a Third of All Sensitive Data Stored in Cloud Apps is Encrypted

And 54 percent of IT pros said it's more difficult to protect confidential or sensitive information when using cloud services, a recent survey found.

O2, Kimpton Hotels Investigate Data Breach Claims

The O2 breach appears to have been caused by password reuse, while the Kimpton breach leveraged point-of-sale malware.

New IoT Threat Exploits Lack of Encryption in Wireless Keyboards

The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.

Clash of Kings Data Breach Exposes 1.6 Million Accounts

The exposed data includes user names, email addresses, IP addresses, device identifiers, Facebook data, and hashed and salted passwords.