Network Security 

M&A Due Diligence, Cyber Security, and the Massive Yahoo Data Breach

Verizon, which announced plans to acquire Yahoo two months ago, says it only learned of the breach last week.

Chinese Researchers Find Major Security Flaws in Tesla Model S

The flaws enabled the researchers to fold in the rear view mirrors, pop the trunk, and activate the brakes remotely while the car was being driven.

Startup Spotlight: Cymmetria's Cyber Deception Technology

Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.

40 Percent of Organizations Store Admin Passwords in Word Documents

Still, 55 percent say they have evolved processes for managing privileged accounts, a recent survey found.

28 Percent of Organizations Don't Encrypt Data in Public Cloud Environments

And 47 percent said security concerns are their main reason for avoiding cloud deployments, a recent survey found.

Which Threat Risk Model Is Right for Your Organization?

Which threat risk model is right for you? We compare strengths and weaknesses of three popular ones: STRIDE, DREAD and CVSS.

FBI Urges Ransomware Victims to Report Attacks

Doing so, the FBI stated, 'provides law enforcement with a greater understanding of the threat.'

World Anti-Doping Agency Breached by Russian Hackers

Confidential medical information for U.S. athletes including Simone Biles and Serena Williams was published online.

How Symantec's New COO Measures Security Success

Mike Fey, president and COO of Symantec, talks about how he will bring the former Blue Coat and Symantec teams together. [VIDEO]

How to Protect Bank Cards in E-Commerce Apps

Rapid growth of e-commerce applications mean security is sometimes lacking. How can developers secure e-commerce apps?

DDoS Attacks Up by 75 Percent in Q2 2016

The largest attack detected in the second quarter peaked at 256 Gbps, according to Verisign.

U.S. Small Businesses Lose $75 Billion a Year to Ransomware

Downtime resulting from ransomware attacks can cost companies more than $8,500 an hour, a recent survey found.

Hutton Hotel, Kimpton Hotels Acknowledge Payment Card Breaches

Cards used at front desks and restaurants may be affected.

IBM X-Force Red Takes Pen Testing to Next Level

Penetration testing should be about more than hitting a compliance goal.

SWIFT Warns of New Cyber Attacks on Banks

As many as 12 banks may have suffered breaches.

68 Million Dropbox Account Credentials Exposed

The data comes from a breach dating back to mid-2012.

52 Percent of Hackers Would Help the FBI Hack the iPhone for a Fee

And nine percent would do it for free, a recent survey found.

Must You Use Microsoft's In-Box DNS?

Active Directory does not require Microsoft DNS to function properly. In fact, organizations can enjoy security benefits by using non-Microsoft DNS.

Just 30 Percent of Organizations Feel Ready to Handle IoT Security Risks

Still, 47 percent expect the number of IoT devices on their networks to increase by at least 30 percent next year.

66 Percent of IT Pros Say Privileged Users Access Sensitive Data Simply Out of Curiosity

And 74 percent think privileged users believe they're empowered to access all the information they're able to view, a recent survey found.

Credit Card Breach Hits All Eddie Bauer Stores in U.S., Canada

Names, card numbers, security codes and expiration dates were accessed.

7 Database Security Best Practices

Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.

How DevSecOps Will Change Security

DevSecOps will become a common thread in every enterprise security approach, opines Mike Kail, co-founder and chief innovation officer of Cybric.

Sage Employee Arrested for Insider Breach

The breach may have exposed the personal information of employees at 280 companies.

Should Enterprise Security Software Be under Warranty?

Should enterprise security software offer warranties, much as consumer products and services do?