Security Wire Daily News

Subscribe to Security Wire Daily News feed
Updated: 32 min 58 sec ago

To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Tue, 05/13/2025 - 3:18pm
To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Tue, 05/13/2025 - 1:15pm
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Check out the latest security news from the Informa TechTarget team.

Fri, 05/09/2025 - 5:22pm
Check out the latest security news from the Informa TechTarget team.

The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies.

Fri, 05/09/2025 - 3:20pm
The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies.

A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.

Fri, 05/09/2025 - 11:14am
A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.

RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security.

Fri, 05/09/2025 - 10:13am
RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security.

Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs for the long term.

Thu, 05/08/2025 - 4:35pm
Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs for the long term.

North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators.

Thu, 05/08/2025 - 2:26pm
North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators.

Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats.

Thu, 05/08/2025 - 12:23pm
Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats.

The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.

Thu, 05/08/2025 - 11:21am
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.

The arpwatch utility flags administrators in the event of any unexpected changes or unauthorized devices, which could signal ARP spoofing or credential-harvesting attacks.

Wed, 05/07/2025 - 12:45pm
The arpwatch utility flags administrators in the event of any unexpected changes or unauthorized devices, which could signal ARP spoofing or credential-harvesting attacks.

Security testing enables companies to discover and remediate vulnerabilities and weaknesses in apps before malicious actors find them.

Wed, 05/07/2025 - 12:45pm
Security testing enables companies to discover and remediate vulnerabilities and weaknesses in apps before malicious actors find them.

Every facet of business operations is exposed to risks, requiring a risk management team that's composed of a diverse mix of corporate executives and managers.

Wed, 05/07/2025 - 11:45am
Every facet of business operations is exposed to risks, requiring a risk management team that's composed of a diverse mix of corporate executives and managers.

Enterprises remain nervous about deploying AI agents in production, as IT vendors vie to demonstrate the value and comprehensiveness of their platforms.

Tue, 05/06/2025 - 2:02pm
Enterprises remain nervous about deploying AI agents in production, as IT vendors vie to demonstrate the value and comprehensiveness of their platforms.

Segregation of duties (SoD) is an internal control mechanism designed to prevent errors and fraud by ensuring at least two individuals are responsible for the separate parts of any task.

Tue, 05/06/2025 - 2:02pm
Segregation of duties (SoD) is an internal control mechanism designed to prevent errors and fraud by ensuring at least two individuals are responsible for the separate parts of any task.

With current Exchange Server versions expiring in October, Microsoft's move to subscriptions and a tight migration deadline puts pressure on organizations keeping on-premises email.

Tue, 05/06/2025 - 10:59am
With current Exchange Server versions expiring in October, Microsoft's move to subscriptions and a tight migration deadline puts pressure on organizations keeping on-premises email.

An API security specialist's newly launched WAAP product outranked more established WAF competitors during independent benchmark testing.

Mon, 05/05/2025 - 6:33pm
An API security specialist's newly launched WAAP product outranked more established WAF competitors during independent benchmark testing.

From attacks on private organizations and manufacturers to healthcare organizations and even entire countries, ransomware has done extensive damage in recent years.

Fri, 05/02/2025 - 5:39pm
From attacks on private organizations and manufacturers to healthcare organizations and even entire countries, ransomware has done extensive damage in recent years.

An RSAC 2025 speaker explained why companies should begin their quantum-safe journey now and how crypto-agility adoption helps prepare for post-quantum cryptography.

Thu, 05/01/2025 - 3:57pm
An RSAC 2025 speaker explained why companies should begin their quantum-safe journey now and how crypto-agility adoption helps prepare for post-quantum cryptography.

Although best practices have changed, many organizations lack a suitable versioning strategy. Proper document version control can improve collaboration and fact-checking.

Thu, 05/01/2025 - 2:53pm
Although best practices have changed, many organizations lack a suitable versioning strategy. Proper document version control can improve collaboration and fact-checking.

Pages