The FBI failed to notify scores of U.S. officials that Russian hackers were trying to break into their personal Gmail accounts.
Russian state hackers don't leave room for error in your cyber-security defenses.
Even the FBI and your local police can't agree on who you should contact first.
Make proactive threat hunting a standard part of your security best practices and not just an element of incident-response measures.
Companies like Equifax don’t like you knowing they’ve been hacked—but it would be better for consumers and businesses if they were quicker to report it.
Organizations ready to take the next step in threat detection tools and methods should explore the emerging practice of threat hunting as a way to improve their security and monitoring operations.
When life gets tough, you feel knocked down, and need to survive setbacks, a strong mind will help you experience discomfort yet still feel comfortable.
U.S. law enforcement and other government agencies face a pair of daunting cybersecurity challenges around servers and web shells.
Reporters can tell you some of what's happening -- but not everything, and here's why.
The FBI Is at the Door! What Should I Do? Learn how you can protect your legal rights when being questioned by the FBI or other law enforcement.
There are a number of myths about detecting deception. Fidgeting, looking away, touching your mouth, all of these things are commonly thought to be practices that indicate deception. Jim Clemente, former Supervisory Special Agent for the FBI, explains why that isn't always the case and how people like him can decipher what these indicators really mean.
While email can be used as a great method of communication, it can also be a venue for a rising…
The FBI has a problem. The agency needs to hire hackers to build out its cyber crime division, but it also will not hire anyone who's smoked weed in the past three years. And guess what? A lot of hackers like to smoke weed.
Security experts provide advice to help you spot new attacks, improve your technical defenses, and train end users and tech team members.
For organizations whose cyber defenses may have been going the way of one dimensional, threat hunting has breathed new life into sputtering security programs.
Willpower is something that can be learned and can be strengthened with practice. It’s also a vital component of mental toughness.
Not coordinating with the FBI, failing to establish a secure channel to a device's firmware and focusing solely on the immediate problem and not the broader security issue underpinning it can make a bad situation worse, members of the Braintrust say.
An inordinate amount of data passes through business email addresses every day. However, the more companies send valuable data through email channels, the