IoT devices are increasingly becoming a way to pay for goods and services, shifting the "internet of things" to the "internet of transactions." Gord Jamieson of Visa Canada discusses steps the card network is taking to ensure these payments are secure.
Security is a journey not a destination. What's been deployed today may be found
to have a vulnerability tomorrow. Operating systems like Windows Server 2003 and
2008, which were once trusted building blocks for critical applications, are now
potential liabilities as time goes on and maintenance comes to an end and...
It's time to proactively protect your company - and the place to start is your endpoints. Why? Because IDC research found that 70% of successful breaches begin at the endpoint. However, if you are taking a traditional approach to endpoint security, it may be causing you more problems than it solves.
SMBs have historically struggled to adopt modern security products that work cohesively to support business operations with a comprehensive line of defense against sophisticated attacks.
Download this analyst report to learn how SMBs are utilizing endpoint security to:
Coordinate security across their...
The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face. Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them.
One mystery with the recently discovered payment card sniffing attacks against such organizations as British Airways and Newegg has been how attackers might have first gained access to the victims' networks. But a number of cybercrime markets sell such access, in some cases for as little as 50 cents.
Criminals operating online continue to target cryptocurrencies, leverage phishing and other social engineering attacks, as well as tweak age-old scams - including Nigerian prince emails - for the modern age. So warns Europol in its latest Internet Organized Crime Threat Assessment.
A case involving alleged insider theft of protected health information from a hospital in New York illustrates why healthcare organizations need to take extra precautions to prevent similar incidents. Security experts offer recommendations.
Email security in the era of the cloud is a critical concern for business leaders. This tool is a powerful way for businesses and services to communicate with their customers. From transaction notifications to billing statements to social media updates, email is a proven reliable and effective way for businesses to...
Digital transformation has made it increasingly easy for consumers to switch institutions at the least provocation.
But leaders like Capital One, Guardian Life, and Goldman Sachs are embracing change and moving to the cloud. They're creating great customer experiences - and fighting churn - by integrating email into...
Attack code known as EternalBlue, designed to exploit a Windows SMB flaw, continues to work for attackers despite Microsoft having issued patches more than a year ago. One major U.S. business was a recent victim as part of a cryptocurrency-mining malware campaign, a researcher reports.
Intel has had a challenging time lately on the vulnerability front. It has issued yet another patch for its Management Engine after a researcher was able to extract two types of encryption keys. The problem was a repeat of one that Intel patched just last year.
The new Apple Watch 4, which includes a sensor that can conduct an electrocardiogram, spotlights the emergence of consumer apps that appear to cross over into the territory of medical devices, raising potential cybersecurity concerns.
The Food and Drug Administration should increase its scrutiny of the cybersecurity of networked medical devices before they're approved to be marketed, a new government watchdog agency report says. FDA says it will carry out the report's recommendations.