Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders.
Lazarus Research Highlights Threat from North Korea A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen.
Consumers Care About Privacy, but Not Enough to Act on It People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.
Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.
Cybercriminals Target Young Gamers Deceptive and inappropriate tactics are prevalent in free gaming apps, according to a new report to be released at the RSA Conference.
Organizations Taking Less Time to Detect Breaches But by the time they became aware, attackers have been on their networks for more than six months, new 2018 data shows.
Incident Response: Having a Plan Isn't Enough Data shows organizations neglect to review and update breach response plans as employees and processes change, putting data at risk.
Care and Feeding of Your SIEM Six simple steps to mitigate the grunt work and keep your organization safe.