InfoWorld picks the top open source software for protecting networks and their users
Every security crisis presents the opportunity to point fingers, but that's just wasted energy. The criminals are at fault—and we need to work together to stop them
Did the French president-elect's security team use cyberdeception techniques to fight off phishing attacks? Submitting fake credentials definitely qualifies
Passwords may not be dead, but the latest NIST guidelines promises a less frustrating and more secure authentication future
Shodan is now offering the Malware Hunter scanning tool, which uncovers systems manipulated to control malware-infected devices
Phishing, malware, ransomware, hacking, cyberespionage: The latest Verizon Data Breach Investigations Report shows the best prevention is basic security hygiene
The campaigns are bigger and more sophisticated, and they're causing far more damage as the attackers learn new techniques and collaborate with other groups
Google outlines how BeyondCorp determines whether a device should be allowed to access an application in a perimeter-less network environment