Brian Honan sets out a number of security strategies organizations should adopt to defend and respond effectively to cyber-attacks
Getting Ready for Some Holiday Shopping? So Are the Bots
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
#IRISSCON: Transition from Cybersecurity to Cyber-Immunity, Says Eugene Kaspersky
Eugene Kaspersky argues traditional approaches to cybersecurity are no longer sufficient for protecting critical infrastructure from cyber-attacks
Suspected EncroChat Drug Trafficker Faces Trial
Kalman Butt is said to have used the encrypted comms platform
Malicious PyPl Packages Downloaded 40,000+ Times
Threat actors go to great lengths to stay hidden on the repository
Less than Half of Consumers Change Passwords Post-Breach
A fifth took no action at all, according to non-profit study
North Korean Cyber-criminal Recycles Tactics and Targets
Researchers investigating the activities of TA406 are left with a prevailing sense of déjà vu
Retail Data Needs Better Security in a Contextual World
Do you remember the first time you made an online purchase? Me neither. I?ve made so many online purchases over the years, and I?ve probably made more in the past 18 months than in the past 5 years combined.
Man Charged with Impersonating Female Minnesota Student Online
Charges brought in cyberstalking case that forced victim to move house
Healthcare Modernization? More Like Building the Plane While Flying It
Anyone running a business is likely familiar with the phrase ?building the plane as you?re flying it.? And through the craziness of the past 19 months, many of us lived the phrase, becoming pilots and engineers of our new realities overnight.