Researchers explore how modern security problems can be solved with an examination of society, technology, and security. Cybersecurity challenges cannot be solved with computers alone. They demand a closer look at how social and technical systems overlap, and how this growing overlap influences security. As it stands, many of these issues are being addressed separately.
TrueFort plans to use the funding to expand sales, marketing, R&D, customer support, and go-to-market initiatives. TrueFort, an application behavior security analytics company, has raised $13.7 million in Series A funding, which will be used to expand its business of protecting organizations from breaches. Former bank technology executives developed TrueFort’s behavioral analytics technology, which it
Organizations with 250 or fewer employees often employ a higher percentage of security pros than their larger counterparts. Small businesses often have a bad reputation for being the gateway to supply-chain attacks on larger enterprises. But this may not be the case, as seen in a new report on small-business security. As part of (ISC)²’s
2019 has, so far, been a busy year for venture capitalists in the security industry. Here are 7 funding rounds important because of the technologies or market trends they represent. 1 of 8 Venture capitalists look for the “big win,” not for this week, but for the future. And they stake millions of dollars on
A new extension and browser alert aim to help users report deceptive sites and prevent them from encountering fraud. Today Google announced two new features intended to protect Chrome users from deceptive sites, which are becoming a broader threat as cybercriminals advance their fraud strategies. Google Safe Browsing has been blocking phishing attacks for more
Cybercriminals use new types of top-level domains, topical keywords, and targeted emails to trick victims into clicking malicious links. Domain fraud is an old cybersecurity risk manifesting in new ways as cybercriminals take advantage of new top-level domains, privacy regulations, and social engineering tactics. More than three-quarters of businesses found “lookalike” domains posing as their
In a year when security companies have been snapped up left and right, these deals stand out from the chaos. 1 of 12 Anyone watching the cybersecurity market has likely noticed a wave of acquisitions making headlines. The M&A activity that remained constant last year has only increased in 2019. “It’s like something’s in the
Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents. Good data on attacker tactics, security incidents, and breaches is key to identifying trends in cybersecurity, but datasets — even among academic researchers — are
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.
In security, what we don’t look at, don’t listen to, don’t evaluate, and don’t act upon may actually be more important than what we do.