Despite two large cyber attacks making headlines in the first six months of 2017, the security firm is still finding cybersecurity responsibility lies solely with the underfunded IT team.
The well-known fact-checking site claims it's being held hostage by an outside vendor. But under the surface, there's a fight between contending ownership groups.
No More Ransom launched a year ago: here's the story of how cybersecurity firms and law enforcement are working together to bring down ransomware.
The deal will give Checkmarx interactive teaching tools for the changing IT landscape.
The solution aims to prevent misconfigurations, malware, and noncompliance threatening enterprise networks.
The new solution is aimed at enterprise players which need a way to manage SSL/TLS certificates.
As the number of connected devices proliferates, security testing should occur completely through development to deployment, IBM says.
The malware went largely undetected for several years and is only detectable on a handful of security products, but the "fully featured" Mac backdoor can take control of an entire computer.
Unsecured instances of Docker can lead to potentially large vulnerabilities inside the data center. Here's what you need to know right now.
Weeks after the ransomware attack that rippled across the globe, companies are still trying to deal with the damage.
Microsoft's enterprise customers can soon use its Azure-hosted fuzzing service to ferret out bugs in their own Windows and Linux applications.
The colorful security head says he was in an incident where someone attempted to allegedly "off" him.
Driving license data has potentially been leaked due to carelessness in an outsourcing deal.
The chips can be used to login to PCs, use company machines, and make purposes -- but how many will sign up?
A new study shows that 94 percent of Android antivirus failed to stop a comprehensive set of malware attacks.
The security researcher said the bug could've gained access to an entire account's iCloud Keychain.
Hacker Summer Camp kicks off this weekend, and with many conferences, there's a very noticeable "race to first" by marketing teams. In that race, marketers need to first revere the research and respect the researchers, especially heading into the next 10 days. Here's why.
Simulations at ANU's National Security College suggest that the world is sleepwalking towards war. Meanwhile, international cyber negotiations could be set back a decade.
Hanno Böck forged incorrect private keys to test if Symantec would revoke his legitmate certificate, and sure enough, they did.
RSA's VP and GM of Global Public Sector Practice Mike Brown believes there's a better way to thwart terrorism than breaking end-to-end encryption, as recently proposed by the Australian government.