
NIST has released a second draft of NIST Special Publication (SP) 800-52 Revision 2,Guidelines for the Selection, Configuration, and Use…

New research from ISACA and the CMMI Institute finds that few employees understand their role in protecting information With cybersecurity threats…

In most cases, fake Flash updates pushing malware are not very stealthy. In recent years, such imposters have often been…

Comment Period Closes on Monday, October 15 The National Cybersecurity Center of Excellence (NCCoE) recently released draft practice guide National Institute…
Kaspersky Lab researchers monitoring the various clusters of the long standing, Russian-speaking threat actor, Turla (also known as Snake or…

This interview with Dr. Keyun Ruan dives into her research in identifying the value of ‘cyber’ in business, establishing traceability…

Local research from Aruba and Ponemon Institute Shows Security Teams View Machine Learning and Network Visibility for Users and IoT…

Malware and Hacking Responsible for Nearly Three Quarters of All Breaches in 2018 Bitglass has released its 2018 Financial Breach…

NIST has announced the final public draft Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations–A System Life…

Palo Alto Networks threat intelligence team, Unit 42 has released new research about the cybercriminal Reaper group, suspected by a…