Hackers immediately use or develop for their purposes the best hacking technology out there. It is this same innovative thinking we must use in approaching our cyber defense technologies.
Organizations around the world suffered over 700 data breaches in 2015. Your organization may have escaped 2015 without a data breach. But that’s no guarantee that hackers, cybercriminals and others won’t turn their attention to your business soon.
A new kind of Android malware steals online banking credentials and can hold a device's files hostage in exchange for a ransom, delivering a particularly nasty one-two punch.
Governors of more than a dozen states are committing to modernize their energy infrastructure, plan for an "energy transition," clean up the transportation sector and bring transmission into the 21st century.
In an effort to help patients configure home medical devices and to protect related healthcare data from security risks, a group from Dartmouth College has developed a digital “magic wand” for securely connecting devices to Wi-Fi networks.