1 day ago CXOs are the weakest link in mobile device security but most likely to suffer cyber attacksZDNet View Synopsis+1
A new study by MobileIron reveals that C-level executives feel frustrated by mobile security protocols and often request to bypass them.
Consultant Nic Miller Highlights Critical Factors to ConsiderSmall and midsize companies don't need to spend money on expensive security products, says cybersecurity consultant Nic Miller, but they must consider several critical factors as they devise their strategies.
Recent versions of the Valak malware have been used in attacks targeting Microsoft Exchange servers at organizations in the United States and Germany, Cybereason's Nocturnus researcher team warns.
Though hacktivism can sometimes stem from a legitimate cause, one person couldn't resist turning to true cybercrime, according to Check Point Research.
ST Engineering and National University of Singapore are looking to tap quantum cryptography technology to build network encryption tools, so these will be ready to mitigate security risks that may emerge when quantum computing becomes mainstream.