Security

Understanding how malware attacks work is vital to defend against them. To ease this process, threat analysts have developed models that map the stages of cybersecurity attacks, allowing defenders to identify areas where they can break the chain and stop the attack. The Cyber Kill...

Blockchain, smart contracts, and predictive analytics are among the financial service technologies reshaping the ways transactions are conducted and customers are served. With a rash of startups threatening to disrupt legacy operations, organizations of all sizes are turning to the latest technologies to improve their...

The Department of Information Services in Baton Rouge used geographic information systems and data from 911 calls, search-and-rescue efforts, and more to create a map visualization of the impact of recent floods in the region. The story is a prime example of how IT professionals...

A report from Quick Heal outlines the top malware afflicting Windows and Android device users, and offers a brief description of each of the malware families. The second quarter of 2016 saw a small decline in the detection count malware in both Google Android and Windows-based...

For every website and service simplifying how we get information, complete a transaction, or communicate with others, there's a growing number of web-based threats intent on compromising user safety and privacy. Securing all web content over HTTPS is now a necessary step as we increase...

You only have to look at recent headlines to confirm that cybersecurity is a critical concern that touches every industry and every individual, and threats are only continuing to increase. CISO shares how other industry leaders can help close the talent gap....