2008 is a special year for the digital security community. Twenty years have passed since the Morris Worm brought computer security to the attention of the wider public, followed by the formation of ...
The dynamic and ephemeral nature of the cloud can make detecting and responding to cybersecurity incidents challenging, even for professionals with extensive security expertise yet with little cloud ...
Fake employees are an emerging cybersecurity threat. Learn how they infiltrate organizations and what steps you can take to ...
Tanya Candia is an international management expert, specializing for more than 25 years in information security strategy and communication for public- and private-sector organizations. State and local ...
According to Cybereason, the new solution offers forensic-driven incident response that extends deeper value to defenders. By augmenting its existing MalOp Detection Engine with intelligence from DFIR ...
More than a third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to a report by cyber security firm F-Secure. The company’s latest ...
Planning for the seemingly unlikely event of a severe cybersecurity incident seems unwieldy and time-consuming for many organizations. But consider this: According to the Ponemon Institute, 90% of ...
Forbes contributors publish independent expert analyses and insights. I write about contemporary cybersecurity and online privacy issues. Antivirus programs alone are not potent enough to identify and ...
There are well over 1,200 road tunnels in Norway. Camera-based incident detection is the preferred way to keep these tunnels safe and support tunnel operators in organizing fast incident response.