TheDarkOverlord claims to have stolen 10 million patient records and is selling them on the black market. But in the meantime, the hacker has also been trying to extort his victims with the promise that the data will never be sold, if a ransom is paid. Read More ▶ |
|
| White Paper: Aruba, a Hewlett Packard Enterprise company Mobile and IoT devices such as laptops, smartphones, and smart watches can now be found in most businesses, as users demand access to the corporate network from anywhere, anytime. Securing for BYOD is a conversation IT needs to have, but it doesn't have to be a painful one. Employ these 8 best practices to boost your network security and end those headaches for good. Read More ▶ | A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident response plan so to reduce the impact of that data breach. Read More ▶ |
| For a limited time, the bundle of courses is only $29.99 and jam-packed with over 48 hours of courses and 50 hours of advanced training. Read More ▶ |
| Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers. Read More ▶ |
| | Code-hooking techniques used by security, performance, virtualization and other types of programs to monitor third-party processes have introduced vulnerabilities that hackers can exploit. Read More ▶ |
| White Paper: Aruba, a Hewlett Packard Enterprise company Get the Network Blueprint for GenMobile for the tools to solve top IT challenges so you can get your network ready for the digital workplace. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|