|
White Paper: Kaspersky When a business is hit by cryptomalware, data is encrypted into an unreadable form until a ransom is paid to cybercriminals. No wonder 42% of SMBs consider this to be one of their most security threats. Download this whitepaper to learn how you can protect your business from this dangerous scenario. Read More ▶ |
>From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed. Read More ▶ |
|
Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Read More ▶ |
|
A Russian-speaking hacker has been found selling stolen login credentials for a U.S. agency that tests and certifies voting equipment, according to a security firm. Read More ▶ |
|
|
This has been another eventful year in the realm of cyber security—with a number of high-profile data breaches that affected large numbers of people and technological developments that promise to impact the market for years to come. Read More ▶ |
|
The rapidly expanding wearable device market raises serious privacy concerns, with some device makers collecting massive amounts of personal data and sharing it with other companies, according to a new study. Read More ▶ |
|
Following a massive data breach that affected over one billion Yahoo accounts, users should review the settings of their accounts, clean their mailboxes and turn on additional account security features. Read More ▶ |
|
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them Read More ▶ |
|
The new internet communication protocol, HTTP/2, is now being used by 11 percent of websites -- up from just 2.3 percent a year ago. And while there have been no security problems found in the HTTP/2 protocol itself, there are vulnerabilities in some implementations and the possibility of lower visibility into internet traffic, so it's worth waiting for everything to shake out. Read More ▶ |
|
Video/Webcast: Dyn Inc Watch this On-Demand webinar as it discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure. Read More ▶ |
When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success. ▶ |
Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that. ▶ |
This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here. ▶ |