Customer names, card numbers, expiration dates and verification codes were accessed by malware.
They lack the buzz of more recent security innovations, so network firewalls can be overlooked. Yet firewalls are an essential aspect of any security strategy. We cover the basics of network firewall technology and look at the latest in next-generation firewalls.
And 37 percent turn over complete control of keys and encryption processes to cloud providers, a recent survey found.
The latest version offers improved visibility into their application container environments and helps organizations ensure that they take security and compliance into consideration from the start.
That's far higher than 2016, when less than 60 percent said they planned to do so.
The use of VPNs and other tools to bypass security restrictions doubled from 2015 to 2016, a recent survey found.
Names, email addresses, home addresses, phone numbers, bank account numbers and sort codes were exposed.
Tens of thousands of dollars have been stolen from seller accounts, and fake items have been listed for sale in an effort to steal even more money.
The startup that enlists ethical hackers to combat cybersecurity threats attracts millions in funding from Microsoft and HPE.
There is money to be made in securing ICS.
The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.
Credit card data from online purchases made between September 2016 and February 2017 may have been accessed.
In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.
While the company was able to avoid falling victim to the ransomware, the attackers may have been able to access patient data.
The companies team up to head off the inevitable rise in security threats targeting application container environments.
When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.