New studies debut every day in the cybersecurity field. But how does one separate true research from marketing hype? Researchers Wade Baker and Jared Ettinger discuss the distinguishing qualities of credible studies.
As fraud has shifted over the past decade from basic account takeover to synthetic identities and new account fraud, so has the field of identity protection evolved. Tom Thimot and George Tubin of Socure say they are here to disrupt the industry.
Beazley Breach Response Services, a unit of global insurance company Beazley, reports that nearly half of the more than 3,300 breaches it investigated last year traced to a hack attack or malware infection. And half of those hacking/malware attacks were tied to business email compromise schemes.
An Australian computer security researcher will be sentenced May 1 after pleading guilty to several charges related to an unauthorized intrusion into the network of GoGet, a vehicle sharing service.
A sophisticated attack campaign dubbed "Operation ShadowHammer" involved an advanced persistent threat group planting backdoors within Asus computers by subverting the Taiwan-based PC maker's third-party supply chain and updater software, Kaspersky Lab warns.
Infosys is looking at DevSecOps as an organization change management requirement, and it needs to be driven as a movement, says Vishal Salvi, CISO at Infosys.
Too many basic cyber threats are successful too often. And Korn Ferry CISO Michael Miora says it's because enterprises do too little to understand, record and respond to the most common forms of intrusion.
Late in 2018, Broadcom completed its acquisition of CA Technologies. What is the vision of this new cybersecurity products and services enterprise? Clayton Donley, general manager of security at Broadcom, shares insights.
Web application firewalls usually have not been a part of the DevSecOps conversation, but that's changing, says Andrew Peterson, CEO of Signal Sciences.
Netscout is out with its latest threat report, and the research offers some startling new insights into DDoS, advanced threats and the commercialization of cybercrime. Hardik Modi offers analysis.
CrowdStrike is out with its 2019 Global Threat Report, which includes a ranking of the most dangerous nation-state adversaries. The company's CTO, Dmitri Alperovitch, discusses the report's key findings about threats and threat actors.
Many large organizations are app developers, and individuals are increasingly using apps to access computing resources. But the age-old problem of code not being reviewed for flaws at every stage of testing and production continues, warns Joseph Feiman of WhiteHat Security.
A pair of U.S. chemical manufacturing companies have reportedly been struck by the LockerGoga ransomware over the past month and continue to recover from the same cyberattack that took down part of aluminum giant Norsk Hydro last week.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.