Kaspersky Lab and the AV Security Hole
It's unclear what happened in the reported theft of NSA data by Russian spies, but an attacker would need little help to steal if he or she had privileged access to an AV vendor's network, security experts say.
Cybersecurity's 'Broken' Hiring Process
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.
10 Hot Cybersecurity Funding Rounds in Q3
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.
Endpoint Security Overload
CISOs and their teams are over-investing in endpoint security tools, driving inefficiency and a need to consolidate data.