All the latest blog posts from the most relevant cyber security companies in the business.

Experience is a valuable teacher, especially when you’re able to learn lessons from others who have taken similar journeys. That’s why we recently polled some of our most successful mobile security customers. They had valuable stories to share about the process they underwent evaluating and implementing mobile security solutions. We wanted to know the backstory:…

Cryptojacking has unquestionably gone mainstream. Despite heavy media and industry attention, organizations are struggling to meet compliance requirements in public cloud environments, according to RedLock. On the flip side, there’s evidence that companies are becoming more aware of cloud account compromises and implementing best practices to prevent attacks, but there’s still no shortage of new attack…

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.

The EU’s new data protection rules that enter into force later this month are having an impact around the world as firms, including in the United States and China, move to comply. While all firms globally are required to comply with the provisions of the General Data Protection Regulation (GDPR) when it comes to the data of…

A year after the WannaCry ransomware attack impacted an estimated 200,000 victims, new research has revealed that organizations across the UK are still struggling to deal with ransomware. Webroot surveyed over 400 IT decision makers at UK businesses and found that 45 percent of those surveyed had suffered a ransomware attack, with nearly a quarter (23 percent) actually paying the ransom….

Our value today is measured in numbers. Followers, connections, likes, tweets, and impressions now count toward not only the value of our opinions but also quantify our sphere of influence. These metrics, however, are easily manipulated to such an extent that even elections have allegedly been at the mercy of the social media numbers game….

So, you’ve been working all year long and finally decided to go on a nice vacation, taking a couple of weeks away from home, office, and everything else? That’s great! Of course, you don’t want anything at all to go wrong with your hard-earned break. To avoid disappointments — or worse — down the road,…

Younger generations, particularly women, could be the answer to a cybersecurity skill shortage expected to reach 1.8 million unfilled roles by 2020. A survey of millennials and post-millennials in the US gives some optimism about the cybersecurity talent gap, which seems doomed to worsen due to perception challenges about industry careers, poor access to early…