If you are like most people, you’re excited about the upcoming 3-day weekend. For some, it’s the last chance to enjoy the fun of summer. Hackers are excited too, because higher volumes of travelers offer more opportunities to exploit human and system flaws with malicious attacks.
With the onslaught of cybersecurity threats, breaches, and espionage, new words are constantly being created to describe these acts and technologies.
We tracked down one of the 1.4 million Fiat Chrysler car owners who was affected by the recall due to the Jeep Cherokee Hacking Incident. We didn’t have to go far to find a Jeep Cherokee owner affected by the zero-day exploit on the Harman Uconnect Infotainment system.
Social media is a communication channel imperative for most enterprise businesses today.
Document email attachments bearing malicious macros have become popular again as a weapon of choice among cyber security attackers threatening organizations across industries including finance, government, healthcare, and education.
Most advanced attacks rely on exploiting human and system flaws. Following these 3 tips can boost your personal cybersecurity.
We’ve all read about the cyberattack on the Office of Personnel Management (OPM). The records of 22.1 million people were compromised in what is now considered the worst cyberattack in U.S. history.
We are increasingly being asked this question from organizations – companies looking for best practice to preserve information that has value, along with enforceable practices to get rid of that which does not.
The 2015 SC Magazine Awards announced Proofpoint as the winner of the Customer Service Excellence in IT Security companies.
As marketing teams find success building corporate social media programs– they are unintentionally creating risks for their peers in the Compliance department. The average Fortune 100 has over 320 branded social accounts with over 200,000 followers and 1500 employee participants. The firm is re