Articles Related to breaches

Canadian forum site victim of huge hack, company tells users to reset passwords

Over 45 million records taken from VerticalScope, which operates hundreds of tech, sports and auto forums

Security is dead. Long live security. Using micro-segmentation to make cybersecurity work.

Cybersecurity is dead. ...that is, the way it was originally designed and is currently deployed. Our reliance on computing and communications is critical to...

What CISOs can learn from the U.S. on handling a breach

Congressional testimony on the huge personnel data breach was tough to watch. Infosec pros here should be ready to face that kind of grilling

MOVING TARGETS: THREAT ACTORS ARE ADJUSTING THEIR AIM

In response to this increased awareness, threat actors have evolved and are now utilizing more advanced approaches. Security teams can mitigate risk by knowing more...

What’s behind a cyber attack?

In this white paper from IBM, the shortcomings of conventional breach investigation solutions are explored together with how companies can get get faster and...

Managing security risks and vulnerabilities

Download this IBM white paper to learn how organizations can protect high-value assets and provide scalable, cost-effective, integrated security.

Stay on op - Ge the daily news in your inbox