Scroll down for the latest news and information covering intrusion prevention and detection.
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
LRQA's Lisa Washer explains why people, not just technology, must be at the core of cybersecurity
A British Library report found the most likely source of the incident was the compromise of third-party account credentials and no MFA was in place to stop the attackers
Cloudflare revealed suspected nation-state attackers compromised its systems and accessed source code using credentials stolen in the Okta breach
Insider threats present a very different risk than external cyber-attacks, and these differences must be understood to address this growing challenge
The attackers established a channel for data exfiltration, including from air-gapped systems
eSentire found the threat after detecting suspicious code in a manufacturing customer's network