Point-of-Sale Breach Affects 160+ Applebee's Locations
A breach at one of Applebee's largest franchisees, RMH Franchise Holdings, affected over 160 restaurants late last year.
What is Adaptive Security? A Definition of Adaptive Security, Benefits, Best Practices, and More
Learn about Adaptive Security in Data Protection 101, our series on the fundamentals of information security.
Half a Million Healthcare Records Breached in January
There were at least 37 breaches that impacted the healthcare industry, affecting 473,807 patient records, in January 2018.
U.S. Convicts China's Sinovel of IP Theft Following Years of Litigation
After years of litigation a federal jury convicted Chinese turbine manufacturer Sinovel of conspiracy to commit trade secret theft, theft of trade secrets, and wire fraud last month.
What is DCAP (Data-Centric Audit and Protection)? A Definition of DCAP, How It Works, Best Practices, and More
Learn about Data-Centric Audit and Protection or DCAP in Data Protection 101, our series on the fundamentals of information security.
Study: One Third of Healthcare Breaches Hit Hospitals
According to a study published last week hospital breaches accounted for one third of all data breaches and affected the largest number of victims from 2009 to 2016.
Everything Cold is New Again
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.
Episode 18: Christopher "Tophs" Elisan on Malware Trends
In the latest episode of the Digital Guardian podcast, Christopher "Tophs" Elisan, Principal Malware Scientist at RSA, describes recent malware trends he's seen, two approaches to thinking about breaches, and the dangers of attributing attacks.
Best Practices and Solutions for Securing Enterprise Data in Office 365 (O365)
17 IT and security professionals discuss the best practices and solutions for securing enterprise data in Office 365.
Telegram Zero Day Let Hackers Mine Cryptocurrency, Drop Backdoors
Researchers said Tuesday the app was vulnerable to a right-to-left override attack, something which let attackers trick unsuspecting users into installing malware.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.