Author: Bert Rankin

As one might expect, this year’s RSA security conference is buzzing with Internet-of-Things (IoT) security and related presentations, products, and demonstrations. With dozens of vendors and workshops focused on securing and managing unknown devices, IoT security is certainly a hot topic for 2018 and beyond. From...

Machine learning has found application in a breadth of industries, from cancer detection to voice recognition to identity theft prevention. Perhaps unsurprisingly, cybersecurity is another area where machine learning can increase the efficiency and accuracy of operations. This is a topic generating a lot of discussion...

RSAC 2018, one of the largest cybersecurity conference events in the world, is almost here. More than any other, this is the place where leading security companies, researchers, CISOs, and their staffs from across the globe come together to talk, learn, present, and speculate about...

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....

Identity theft continues to be a challenging and expensive risk for consumers, and malware that’s specifically designed to steal users’ account data and identities are often used to commit the crime. The reason for this persistent threat? Simple, identity theft is a very lucrative business for cybercriminals. The...

With no remedy in sight to the cybersecurity talent shortage, organizations must be creative, determined, and mobilized. Rather than focusing on what the organization doesn't have, cybersecurity professionals must instead get optimal performance from the resources they have ready and available. Through advanced cybersecurity technologies,...

Cybercriminals are motivated by several things, including fun, fame, ideology, revenge, and especially monetary gain. They use many techniques in their quest to achieve these goals, and keylogging malware (aka keyloggers), and other password snatching techniques are among their primary tools. Understanding the Why of Malware...