Carnegie Mellon University announced it will offer a new master’s program in cybersecurity designed to address the growing need for IT security professionals in Washington D.C.
A five-phase strategic and systematic approach to strengthen the resilience of organizations’ current business models is key to business continuity during the coronavirus pandemic, according to Gartner, Inc.
Led by cybersecurity analysts Noam Rotem and Ran Locar, vpnMentor’s research team recently found a serious breach in an open Amazon S3 bucket owned by secure cloud storage provider Data Deposit Box.
As companies find themselves suddenly shifting to remote work due to the COVID-19 (coronavirus) outbreak, many employees are working from home for the first time. While not ideal from a security standpoint, there are simple steps you, and your employer, can quickly take to better secure your new working environment.
The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.
United Natural Foods, Inc. (UNFI), a large grocery distributor in the U.S., announced that Jack Clare has been named its new Chief Information Officer.
Evasive malware grew to record high levels in 2019; over two-thirds of malware detected by WatchGuard in Q4 2019 evaded signature-based antivirus solutions, says a new report.
The White House announced the launch of the COVID-19 High Performance Computing Consortium to provide COVID-19 researchers worldwide with access to the world’s most powerful high performance computing resources that can significantly advance the pace of scientific discovery in the fight to stop the virus.
How can the modern office environment improve their operational strategy to help bolster the security of data and help employees brush up on better cybersecurity strategies? One primary method that is simple and often overlooked is two-factor authentication.
The Cybersecurity and Infrastructure Security Agency (CISA) released guidance to help state and local jurisdictions and the private sector identify and manage their essential workforce while responding to COVID-19.