And just 48 percent of small to mid-sized organizations think their current password policy is good enough, a recent survey found.
And almost a third said dealing with the risks of legacy connected devices is their greatest cyber security challenge, a recent survey found.
A massive exposure of data in misconfigured Amazon S3 buckets demonstrates the urgent need for companies to adjust their approach to cloud security.
By the end of the second day, Ukrposhta said services were back up and running, though slowly and with interruptions.
The three major open-source version control systems were all at risk from a flaw that could enable arbitrary code execution.
The FIN7/Carbanak hacker group is leveraging straightforward phishing emails to deliver a new JScript backdoor called Bateleur.
The attackers leaked more data, and demanded millions of dollars in bitcoin to prevent future leaks.
Once again, Google's media framework is home to the bulk of the patched issues.
The company's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.
The government recently published eight key principles to help manufacturers improve vehicle cyber security.
The company will offer threat monitoring and cyber defense security services to enterprises and SMBs.
FKIE researchers say combining indicators can significantly reduce false positives.
The Internet of Things Cybersecurity Improvement Act sets minimum requirements for the security of IoT devices purchased by the government.
The company's threat detection platform uses deception-based and security intelligence technologies to thwart attacks.
VIDEO: SafeBreach co-founder and CTO Itzik Kotler and VP of Security Research Amit Klein provide an overview of their Black Hat session on how to exploit anti-virus vendors.
An insider breach at a third party vendor exposed thousands of Anthem members' PHI.
VIDEO: Facebook CSO Alex Stamos explains why security shouldn't be baked into the fabric of the internet and why researchers remain attracted to zero-day vulnerabilities.