By Steve Rivers – Technical Director, International at ThreatQuotient A recent report from the government showed that 32% of businesses identified a cyber security attack in the last 12 months,
Trend Micro has announced that it blocked five million cyber-attack attempts against internet protocol (IP) cameras in just five months, highlighting the security risks that continue to impact IP-based surveillance devices.
In the world of cybersecurity, the men and women who keep us safe rely on Indicators of Compromise (IOCs): hashes of malware files, URLs, domain names and other artifacts from
Tech teams will continue to grow in the second half of the year, but finding the right talent won’t be easy, according to Robert Half Technology’s State of U.S. Tech
Nearly half (48 percent total) of cybersecurity leaders across France, Germany and the UK believe their teams are falling behind in the skills race against would-be cyber criminals, according to Symantec. This
One of the biggest challenges for all organizations was a lack of agility, making it difficult for their teams to investigate and respond quickly and accurately to security threats or
Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and Deutsche Bank
In information security, perfection is the enemy of progress, says Lenny Zeltser, VP of Product at Axonius. But It’s one thing to know about this maxim, and another to internalize