Think you're clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we've put together this list of clues to help you avoid a costly error.
Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more.
Identity and access management solutions make sure only approved users can get to sensitive data and applications. They work across a variety of different technology platforms, consolidating all access controls on a single platform
Last Friday, Facebook’s Cambridge, Mass., office played host to an open source hackathon around the theme of GraphQL, a sophisticated data-fetching query language originally developed by Facebook to help manage its vast stores of user...
Data breaches and cyberattacks are evolving, and with the ever-changing role of mobility and the cloud, you have more to protect than ever. See how CDW can orchestrate a next-generation security solutions that protects your network
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how...
Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or factories.
Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian actors to target the U.S. defense industry.
Hackers revived what is largely perceived as a dormant social media site, stealing as many as 427 million customer records in 2016. Forrester reported that there was not another breach even close but it did say that 75 percent of...
Many organizations are turning toward penetration tests as one way to understand the real-world effectiveness of their existing security controls against hackers. CDW's Rapid Security Assessment uses a team of ethical hackers to