From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.
Stories by Maria Korolov
Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.
The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when appropriate.
With the holiday shopping season coming up, and crooks lining up to take advantage of the stress and confusion, this is a good time for merchants to review their payment security procedures.
This year has been the best of times and the worst of times for open source code and security.
Open source software, once just the domain of technology hobbyists, is taking over the software world
Women make up just 11 percent of information security professionals. Just increasing that number to 22 percent would solve the industry's staffing shortage problem.
Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has actually been dropping, from around 30 percent in 1990 to 18 percent in 2010, according to the latest data from the National Science Foundation. As a result, according to the Census Bureau, women accounted for just 27 percent of computer science professionals — down from 34 percent in 1990.
Here are 10 types of links you should never click on.
Whether you're protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees accidentally leaving their laptops in a taxi, encryption is today's hot go-to tool.
Edward Snowden's leaks about NSA spying may have brought the issue of cloud security to broad public attention, but some enterprise users were already concerned about how to take advantage of cloud-based applications while keeping their data safe.
Here’s a list of the 15 Big Data companies to watch.
With the right boss and the right broadband, these tech workers relocated to paradise destinations
Here are 10 things we love about Ubuntu 13 and 5 things we hate.
When workplace computers moved beyond command-line interfaces to the mouse-and-windows-based graphical user interface, that was a major advance in usability. And the command line itself was a big improvement over the punch cards and tape that came before.