Study reveals most organizations take additional precautions to secure IIoT.
Read MoreIntel Security, CSIS Survey: Only half of IT staff agree with executives that their cybersecurity strategies have been implemented.
Read MoreMore than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.
Read MoreNearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.
Read MoreKaspersky Lab researchers have examined the security of applications for the remote control of cars from several well-known car manufacturers. As a result, the company’s experts have discovered that all of the applications contain a number of security issues that can potentially allow criminals to cause significant damage for connected car owners.
Read MoreTenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other launch partners .
Read More