This is a archive for Research.
Most likely anyone receiving spam emails with a file attachment in the last three months, it probably was a file Read More.
Only 33 percent of survey respondents have security strategies in place to protect the growing number of endpoints on their Read More.
The RIG toolkit became the most active exploit kit in September, a new report said. The RIG EK grew by Read More.
Careless or malicious user behavior resulted in data leakage in 33 percent of companies, while 74 percent feel vulnerable to Read More.
One fear with the growth of Internet of Things (IoT) or the Industrial Internet of Things (IIoT) is in a Read More.
Scientists used radar from satellites to show five Texas earthquakes, one reaching magnitude 4.8, ended up caused by injections of Read More.
A vast majority of IT professionals believe the IT security industry is making progress against cyberattacks, those gains end up Read More.
When an application is a solid defense against attacks, but yet no one applies the technology, sometimes you have to Read More.
Cloud usage is gaining strength, but questions remain regarding the security of the environment. While the report focuses on enterprise Read More.
Ninety percent of Big Data users have seen a decline in security breaches, while 49 percent of federal agencies said Read More.