The IBM X-Force team monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents and protect sensitive data.
Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys.
As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.
An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
Security professionals can leverage freely available, open source security tools to protect their environments from threats.
Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.