More than 80% of hacking-related data breaches involve compromised credentials. The Fast IDentity Online (FIDO) Alliance is trying to eliminate that vulnerability. Here's what you need to know.
Guidelines for incident response: The most important steps in the lead up and aftermath of a cyber breach
When an incident occurs, every moment counts. Here's how to make sure you're prepared to quickly identify, contain, and remediate cyber threats.
Organizations are under tremendous pressure to secure sensitive data, but it’s not easy. As privacy requirements continue to proliferate, the path to compliance across an evolving ecosystem of [...]
With Windows 7 extended support reaching end of life, companies still running applications on this operating system could be at risk for cyber attack. Here are three steps you should take to [...]
Cybercriminals are constantly changing their tactics, and it’s no longer possible to prevent — or even detect — every attack. This makes traditional, reactive approaches to security inadequate.
Battered by data breaches, organizations of all sizes and sectors are looking for new ways to reduce their attack surface. Because you cannot prevent — or even detect — every attack, improving [...]