Here's to the sneakiest of the sneaky. These clever phishing messages -- that standard validation measures often missed -- deserve proper dishonor.
Building security into the software development life cycle creates more visibility, but CISOs still need stay on top of any serious threats on the horizon, even if they are largely unknown.
Best practices for a shifting visibility landscape.
Joyce has long worked in US cybersecurity leadership, most recently serving as the NSA's top representative in the UK.
As employees moved to working from home and on mobile devices, attackers followed them and focused on weekend attacks, a security firm says.
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Organizations must fully understand the regulatory guidance on collaboration security and privacy so they can continue to implement and expand their use of tools such as Zoom and Teams.
Faculty and students at the William E. Doar School for the Performing Arts in Washington, D.C. created "Cyberspace," a rap song about online safety as part of the NSA's national STOP. THINK. CONNECT. campaign back in 2012. Wonder how many went into security.
A new machine learning tool aims to mine privacy policies on behalf of users.
Researchers detail a new threat group targeting cloud services to achieve goals aligning with Chinese interests.