A new portal - NoMoreRansom.org - aims to help ransomware victims avoid having to pay ransoms to get their data back. Backed by Dutch and EU law enforcement agencies, plus security firms Kaspersky Lab and Intel Security, the site includes the first decryptor for Shade ransomware.
As Democrats gather in Philadelphia to nominate Hillary Clinton for president, it's a good time to examine the former secretary of state's positions on cybersecurity and online privacy. Here's where she stands.
Too many organizations have too many disjointed security controls, says Vijay Bharti of Happiest Minds. What do they need? An integrated cybersecurity approach that includes analytics, machine learning and a higher degree of automation.
Bruce Schneier, CTO of Resilient Systems, is busy exploring how IoT - the name given to computerization of everything in our lives - is changing the security world. "We're building a world-sized robot, and we don't even realize it."
As the Pokémon Go craze continues to take off, it's clear that when it comes to chasing virtual creatures through real-world locations, too many people fail to keep some common sense guidelines in mind.
France's data protection watchdog has slammed Microsoft Windows 10 for collecting excessive amounts of personal data and failing to use strong security controls. Under the country's data protection laws, Microsoft may now face up to $1.7 million in fines.
As Pokémon Go launches in Japan, the government's cybersecurity organization has issued a nine-point safety guide reminding players to beware of real-world and cybersecurity hazards when playing the augmented reality game.
Amit Yoran, president of RSA, says Asian organizations should move away from traditional processes and embrace change with sharper perspectives in building defences against advanced threats. How do security leaders respond?
Security vendor Novetta recently led an independent investigation into the 2014 Sony breach. What lessons were learned, and how do they apply to today's threat landscape? Novetta's Peter LaMontagne shares key findings.
While enterprises rebuild or upgrade their security programs, they must guard against over emphasizing technology investments while neglecting staffing issues, says Ben Johnson, chief security strategist at Carbon Black.
There's no doubt the cyber threat landscape is vast and complex. These days, it's not a question of whether a company will experience a data breach - it's when and how extensive.
Understanding the true cost of a breach is critical to an effective response. The 2015 NetDiligence® Cyber Claims Study breaks down the...
A new report from Forrester Research says most security strategies do not align with overall business goals, and are in danger of losing credibility. Don't fall into this trap of irrelevance. Download the report and learn 6 steps your business can take today to build a more relevant security strategy that aligns with...
Technology is a key component of any security strategy, but even the best tech will not prevent a data breach. A new report from Forrester Research advises building a risk management framework that that keeps organizations secure, while also building and retaining customer trust.
Download the report today and...
The increase in breaches is having a positive impact on IT security employment, as headlines about one cybersecurity incident after another serve as recruiting tools for skilled cyber defense workers. The IT and IT security workforce reached record levels this past quarter.