Even as cybersecurity grows in importance as a national priority, individual states continue to push ahead with their own data breach legislation, making for an increasingly complicated compliance landscape for cybersecurity managers.
The Securities and Exchange Commission is investigating how companies responded to last year’s SolarWinds hack.
Verizon’s annual report on data breaches finds that more cybersecurity incidents involved external cloud assets than internal ones.
Here's how fileless malware attacks work, the role PowerShell plays, and the steps admins need to take to protect their systems.
A fileless malware attack based on PowerShell uses PowerShell’s native capabilities to breach a Windows system. Here's how they work.
A sophisticated attack on Microsoft Corp.’s widely used business email software is morphing into a global cybersecurity crisis, as hackers race to infect as many victims as possible before companies can secure their computer systems.
According to Treasury staff, the agency suffered a serious breach, beginning in July, the full depth of which isn’t known.
Hackers suspected to be working for the Russian government have been monitoring emails at the U.S. Treasury Department and a U.S. agency responsible for deciding policy around the internet and telecommunications.
AI is better positioned to fend off email phishing attacks because of better data and a layered approach.
Contingency planning is key to recovery when--not if--your organization suffers a security breach.