A high-profile data breach reveals that the interconnectedness of enterprise data means providers and customers must ...
Most data breaches involve hacked email accounts or stolen bank information, and can be protected against by following cybersecurity best practices.
Months of layoffs, funding cuts and lapsed programs leaves U.S. cybersecurity capabilities dangerously thin, experts say. The ...
Twitter Inc suffered from cybersecurity shortfalls that enabled a "simple" hack attributed to a Florida teenager to take over the accounts of several of the world's most famous people in July, ...