Third-party systems form a critical component of customer experience in current digital marketplace. Companies should be aware of third party risks at all times while reaping the benefits of the increased integration.
Companies are opening up to latest cybersecurity strategies like ethical hacking to unearth their digital vulnerabilities. What could they do to ensure the hackers do not endanger their data?
Israel may become a big export player for both offensive and defensive cyber weapons used for cyber espionage as it now takes as little as four months for approval of sale.
Agencies of nearly two dozen small cities and towns in Texas were hit with a ransomware attack that crippled key city services like payment processing operations and printing of identity documents.
Movies are not that far off from reality if you consider how these 6 films help you understand data privacy and hacking in a world of technology imagined by directors and story writers.
Open source software components are useful for software development yet vulnerable to attacks due to its openness. What are some of the best security practices in managing them?
A recent breach of biometrics giant Suprema has exposed 28 million records of facial recognition and fingerprint data including unencrypted username-password combinations stored in plain text.
ESS, largest voting systems company in U.S with at least 260,000 machines in 21 states, was found to have 35 election systems in 10 states connected to the internet when they were not supposed to be.
It’s no debate that artificial intelligence has both positive and negative impacts when used to defend against cyber attacks. One way to deal with it is to combine traditional techniques with AI tools when developing a cyber security strategy.