LATEST ARTICLES

Different Types of Malware and How to Defend Against Them

|

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

READ MORE

Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

|

Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.

READ MORE

Google Patches 36 Vulnerabilities in Chrome 57

|

Researcher finds a high impact memory corruption flaw in Chrome's V8 JavaScript engine.

READ MORE

Considerations for Adding FIDO U2F to Your Security Protocol

|

If you're considering using the FIDO U2F protocol, here's what you need to know.

READ MORE

Authentic8 Advances Disposable Browser Security Model

|

Scott Petry, co-founder and CEO of Authentic8, talks about his past with Postini and how his new startup is the future of online security. [VIDEO]



READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

How to Choose the Right Cybersecurity Solution

On-demand webcast Lately it seems that everywhere you turn, there's another cybersecurity breach — and hackers and thieves are never satisfied with the status quo, continuing to refine their tactics or create new methods of attack. So how do you protect your business now, but also …

Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats

You know that visibility is critical to security. You simply can't secure what you can't see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight …

The Cybersecurity Blueprint: A Four-Part Model for Providing Comprehensive Layered Security

While ransomware has received the most headlines, other cyberthreats have grown in their severity as well. If you're an IT service provider, dealing with the sheer variety of attacks today requires that you take a broad, layered approach to security for your clients. But where do you …
 
SEE ALL WHITEPAPERS
 
Google Chrome 46 Boosts Security

Google Chrome 46 Boosts Security

|

Google patches Chrome browser for 24 security issues

READ MORE
Bugzilla Hacked for Over a Year

Bugzilla Hacked for Over a Year

|

A single password reused from another site provided the attacker with privileged access.

READ MORE
Google Chrome 44 Updates for 43 Vulnerabilities

Google Chrome 44 Updates for 43 Vulnerabilities

|

Google pays out $39,674 in awards to researchers for disclosing web browser vulnerabilities.

READ MORE
Google Chrome 42 Gets Galactic Security Update

Google Chrome 42 Gets Galactic Security Update

|

No towel required for 45 security fixes in Google's Chrome 42 browser.

READ MORE