Movie & TV
Past 30 days
Past 24 hours
Past 7 days
The Ultimate Missing Link in Cyber: Continuous Compromise Assessment
Leveraging existing network data sources, it is possible to assess the enterprise's network to determine their level of ...
Report: Hackers Spied on Moroccan Human Rights Activists
Maati Monjib was one of two activists targeted, Amnesty International says. (Source: Amnesty International) Hackers ...
FIN7 Gang Returns With New Malicious Tools: Researchers
Despite a major law enforcement crackdown on some of its members in 2018, the FIN7 financial hacking gang has returned with ...
Making the Case for National Unique Patient ID
Julie Dooling, a director at American Health Information Management Association Congress is considering whether to allow ...
The Unspoken Insider Threat
When it comes to identifying and stopping malicious and even accidental insider threats, organizations are often overlooking ...
Complying with New York's SHIELD Act
Jon Moore, senior vice president and chief risk officer, Clearwater What should healthcare organizations know about complying ...
The Case Against a 'SOC in a Box'
Homogeneity in security platforms can be a problem, says John Matthews of Extrahop, who makes the case for avoiding ...
On The Frontlines: Patch Management
Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security ...
Preventing Election Meddling: New Recommendations
The U.S. Senate Intelligence Committee has released a second volume on the results of its investigation into Russian ...
Webinar | Security Leaders Share "Secret Sauce" for Success with Digital Transformation
Digital transformation continues to reshape the modern enterprise. Savvy organizations that understand and drive forward ...
Regional Trends in Payment Fraud
Kimberly Sutherland, vice president, fraud and identity, LexisNexis Risk Solutions Payment fraud is a universal threat, but ...
Insider Threat Mitigation: Sanctions and Incentives
Michael Theis, chief counterintelligence expert, Carnegie Mellon University, CERT Insider Threat Center The battle against ...