Security Wire Daily News

Subscribe to Security Wire Daily News feed
Updated: 14 min 29 sec ago

In any given year, certain industries seem to make more attractive targets for ransomware groups. But no single sector shoulders all -- or even most -- of the risk.

5 hours 16 min ago
In any given year, certain industries seem to make more attractive targets for ransomware groups. But no single sector shoulders all -- or even most -- of the risk.

Data loss prevention and data security posture management tools give organizations powerful features to protect data in the cloud and on-premises.

9 hours 18 min ago
Data loss prevention and data security posture management tools give organizations powerful features to protect data in the cloud and on-premises.

Risk exposure is the quantified potential loss from currently underway or planned business activities.

9 hours 18 min ago
Risk exposure is the quantified potential loss from currently underway or planned business activities.

Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.

13 hours 24 min ago
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.

When quantum computers become more widely available, lots of encryption types will be vulnerable. Learn why, plus solutions and how to navigate a post-quantum cryptography world.

Wed, 04/23/2025 - 6:05pm
When quantum computers become more widely available, lots of encryption types will be vulnerable. Learn why, plus solutions and how to navigate a post-quantum cryptography world.

Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.

Wed, 04/23/2025 - 4:02pm
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.

Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to the...

Tue, 04/22/2025 - 3:19pm
Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to the stolen data.

Many organizations require document management software that can automate workflows, support remote access and maintain compliance. Top systems include Box and SharePoint Online.

Tue, 04/22/2025 - 3:19pm
Many organizations require document management software that can automate workflows, support remote access and maintain compliance. Top systems include Box and SharePoint Online.

Docker said it plans new tools integrating the emerging agentic AI standard protocol into existing workflows, including security controls.

Tue, 04/22/2025 - 1:11pm
Docker said it plans new tools integrating the emerging agentic AI standard protocol into existing workflows, including security controls.

Responsible AI is often misunderstood as a way to make sure that a model is safe. However, AI safety examines whether harmful content is being produced or not.

Tue, 04/22/2025 - 8:04am
Responsible AI is often misunderstood as a way to make sure that a model is safe. However, AI safety examines whether harmful content is being produced or not.

Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach.

Mon, 04/21/2025 - 2:51pm
Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach.

Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used.

Mon, 04/21/2025 - 1:51pm
Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used.

A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems.

Mon, 04/21/2025 - 11:50am
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems.

A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks.

Mon, 04/21/2025 - 9:44am
A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks.

Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.

Fri, 04/18/2025 - 3:39pm
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.

Legacy applications create tough choices for admins who must balance business needs and security. This article covers these challenges and modernization strategies.

Fri, 04/18/2025 - 12:38pm
Legacy applications create tough choices for admins who must balance business needs and security. This article covers these challenges and modernization strategies.

The healthcare network's release engineering team is testing the new AI agent pairing to help with code consolidation, modernization and risk mitigation.

Fri, 04/18/2025 - 10:38am
The healthcare network's release engineering team is testing the new AI agent pairing to help with code consolidation, modernization and risk mitigation.

Ransomware creators have become more innovative and savvier as organizations up their defenses.

Fri, 04/18/2025 - 10:38am
Ransomware creators have become more innovative and savvier as organizations up their defenses.

Most businesses have a form of cyber insurance, either through cyber liability and data breach endorsements in traditional business policies or through standalone cyber policies.

Thu, 04/17/2025 - 1:29pm
Most businesses have a form of cyber insurance, either through cyber liability and data breach endorsements in traditional business policies or through standalone cyber policies.

Do concerns of malware, social engineering and unpatched software on employee mobile devices have you up at night? One good place to start is mobile security awareness training.

Thu, 04/17/2025 - 12:29pm
Do concerns of malware, social engineering and unpatched software on employee mobile devices have you up at night? One good place to start is mobile security awareness training.

Pages