This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
In today’s threat environment, alerts aren’t enough. Security teams need to shift from an alert mindset to a security posture that relies on contextualized threat intelligence.
Security's Associate Editor Maria Henriquez analyzes the top data breaches of 2022 and their effects on enterprise cybersecurity and national legislation going forward.
Cybersecurity teams are bogged down by alert fatigue and a lack of attack surface visibility. Leveraging the cyberattacker perspective can help reduce IT security risk.
In Episode 13 of the Cybersecurity and Geopolitical Podcast series, hosts Ian Thornton-Trump and Philip Ingram discuss the geopolitical threat landscape involving Russia, China, Iran and North Korea.
Security professionals need to prepare for the cyber and physical threats presented by the metaverse, including identity theft, bodily injury and more.
A number of U.S. airport websites were temporarily taken offline after three pro-Russia cybercrime groups announced a wave of DDoS attacks targeting U.S. critical infrastructure.
Hacktivism has played a role in the cyberspace around the Russian invasion of Ukraine, as nation-state cybercriminals and civilians hack with political motivation.