2011 State of the CSO
More budget? Perhaps a little. More attention from senior management? Yes, a bit. Better results? That's not so clear.
22 Sep | View galleries
Cybercriminals’ increasing use of artificial intelligence (AI) will create autonomous, self-changing botnets that will be able to tweak and re-deploy attacks in seconds, a security strategist has warned.
David Braue | 17 Jan | Read more
Time’s up for a pesky browser extension that’s infected 1.2 million Windows PCs with adware since September, according to Microsoft.
Are you confident in your abilities to secure the corporate network? You shouldn’t be, according to consultancy firm Accenture.
Last Friday’s attack that cut access to dozens of popular websites was likely carried out by kids rather than Russia or another state actor, according to a firm that’s been closely tracking the incident.
A firm with operations in India and the US has been charged for using pop-up ads to scare consumers into calling tech support to pay for services they don’t need.
What we are seeing across the region is that it is not one specific country being "hacked" more than another - but what we are seeing that the cyber criminals are looking for general weaknesses in our environment.
This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.