Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.
Stories by Maria Korolov
Security startups are often ahead of the technology curve and can provide more personalised service. Here's how to find the best of them and minimise risks
From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.
Bad data is big issue for artificial intelligence, and as businesses increasingly embrace AI, the stakes will only get higher. Here’s how not to get burned.
AI is fast becoming a go-to technology for business transformation, shaking up roles across the enterprise. Here’s how to make the most of this inevitable evolution.
Despite cultural barriers and legacy tech, AI is poised to take over ERP functions, with ERP vendors adding new machine learning features and enterprises keen to investigate.
Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.
Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.
When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.
Ransomware attacks--and defenses against them--are evolving fast, but enterprises still struggle to keep up.
The emergence of the DDoS-as-a-service industry has lowered the costs for attacks to $25 or less, allowing criminals with no technical expertise to reach profit margins of up to 95 percent, according to a report released last week
Criminals are beginning to use artificial intelligence and machine learning to get around cyber defenses
There are many reasons why IT professionals can be fired, but six out of the top nine are related to security. Fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that do not become public, and the failure of a security product or program investment.
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them
There will still be plenty of work to go around so job prospects should remain good, especially for those who keep up with technology, broaden their skill sets, and get a better understanding of their company's business needs.