Please turn on your JavaScript for this page to function normally.
Network
The next step in network security evolution

In 1987, Bernd Fix developed a method to neutralize the Vienna virus, becoming the first known antivirus software developer. In 2017, as we pass the 30-year anniversary, a lot …

biohazard
Sharp rise in fileless attacks evading endpoint security

A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. …

How to stop Emotet malware from infecting your computer

The Emotet banking Trojan has been around since 2014. It continues to evolve, and has even been spotted acting like a distribution method for other banking malware. Latest …

stop
Microsoft offers mitigation advice for DDE attacks scenarios

Microsoft has published a security advisorty containing DDE attack mitigation instructions for both users and admins. What’s a DDE attack? For a while now, attackers …

up
Is trading resilience for business growth a smart strategy?

Not long ago, the probability of a threat materializing was enough to open the IT pocketbook. Today, the mentality has shifted from one of risk prevention to one of risk …

alert
Top threats impacting endpoint security decisions

Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats …

Windows 10
Is the Windows 10 controlled folder access anti-ransomware feature any good?

With last week’s release of Windows 10 Fall Creators Update, users get a new feature aimed at stopping ransomware from encrypting their most important files. It’s …

mobile worker
Enterprises increasingly leveraging endpoint data for security investigations

Code42 confirmed how critical it is for organizations to access and leverage endpoint data for additional uses above and beyond backup and recovery. Among 155 IT professionals …

laptop
Most network endpoints are in the dark: Do you know how to find them?

Traditional manual endpoint security approaches are ineffective and resource-intensive, leading to neglect of basic maintenance such as patches and updates, according to …

Door
Sophisticated threats? It’s usually the basic ones that get you

To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. …

Windows
Maintaining Windows 10 security tops list of enterprise challenges

Companies are experiencing significant challenges in their attempts to keep their endpoints secure. Maintaining Windows 10 security topped the list of challenges with over …

user
Infosec weakest links: Negligent employees and poor password policies

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password …

Don't miss

Cybersecurity news