CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.
As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.
A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.
OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.
At Malwarebytes, our mission is to protect consumers and businesses from the most dangerous cyber threats. Today, we announced a new solution that will dramatically change endpoint detection and response (EDR) for Mac users – a growing target area for hackers. The fact that Mac users are safe from cyber threats is a common misconception.