Enterprise Security

Most contractors the Department of Defense hired in the last five years failed to meet the required minimum cybersecurity standards, posing a significant risk to U.S. national security

Although small businesses lack the resources large enterprises enjoy to defend themselves online, SMBs can avoid becoming cybercrime victims by following these proven, safe computing practices

Streaming video content from non-mainstream providers might make you an unwitting target of content piracy. If you get a bargain pricing offer, you risk becoming the victim of scammers and hackers, losing personal data, and having your financial assets stolen

A recent report highlights the staggering growth of ATO fraud online. In the U.S. alone, around 24 million households have fallen victim to this form of fraud. Social media is one of the driving forces behind the issue, with more than half of all ATOs related to a social media account.

Sens. Gary Peters, D-Mich., and Rob Portman, R-Ohio, introduced the legislation that seeks to address open source software risks in government. The proposed Bill, S. 4913, now awaits action by the Committee on Homeland Security and Governmental Affairs

Cloudflare's Zero Trust SIM is designed to secure every packet of data leaving a mobile device. After it’s installed, the ZT SIM sends network traffic from the device to Cloudflare’s cloud where its Zero Trust security policies can be applied to the data

Cybersecurity threat intelligence provider Cybersixgill has a new solution to reduce cyber risk by accelerating companies’ time to respond. It delivers what could be the cybersecurity industry’s first end-to-end intelligence tool to combat the CVE lifecycle

In today’s world, security isn’t something that businesses can overlook, neglect, or simply outsource. It’s time for founders to step up and start taking ownership of their company’s security

Keeping safe in cyberspace is increasingly difficult as crooks try to exploit uninformed users every chance they get. Add to that, virus and malware threats are never-ending. Here are five things in your control to help keep your digital activity safe

Nearly all the top 10 universities in the United States, United Kingdom, and Australia are putting their students, faculty and staff at risk of email compromise by failing to block attackers from spoofing the schools’ email domains

Companies have a long road ahead to protect privileged identities and access, despite corporate leaders’ good intentions. Less than half of the organizations surveyed by Delinea have implemented ongoing security policies and processes for privileged access management

By continually crawling a website and acting like an actual user, an automated CSP approach can effectively evaluate scripts, data and what they’re doing — all before it’s too late

As criminal activity on the internet continues to accelerate, bug hunting for cash has begun to attract more and more security researchers. In its latest annual report, bug bounty platform Intigriti revealed that the number of analysts signing up for its services has increased 43% from April 2021 to...

Digital devices and home networks of corporate executives, board members and high-value employees with access to financial, confidential and proprietary information are ripe targets for malicious actors, according to a study released Tuesday by a cybersecurity services firm. The connected home is a ...

E-Commerce Times Channels