Trevor Hughes, president & CEO of the International Association of Privacy Professionals (IAPP), recaps the top privacy stories of 2016. Read More ▶ |
|
| White Paper: Fortinet, Inc. The volume of threats is increasing, and cybercriminals are enhancing their techniques every day. Companies struggle to proactively see the threats that are coming, knowing when they have been breached and reacting quickly to minimize the threat. Download this whitepaper to learn about 12 different advanced malware techniques being used today and how sandboxing is an incredible tool that can help. Read More ▶ | Security experts believe smaller IT companies will outsource parts of their security. Read More ▶ |
| Clone video from virtually any video device including game consoles and DVD/Blu-ray. With the push of a button, this device captures and records to any attached USB stick, with no PC required. Read More ▶ |
| The Electronic Frontier Foundation is advising the tech sector to use end-to-end encryption for every transaction by default, and to scrub logs. Read More ▶ |
| | India reportedly ranks as fourth most affected country by ransomware in a global list and the amount of ransomware demanded from the hackers has doubled in 2016 Read More ▶ |
| White Paper: Fortinet, Inc. With the rise of BYOD, cloud-based services, and IoT, network boundaries are expanding and becoming increasingly difficult to secure. The enterprise perimeter is often penetrated and once inside, malware can move through the network, launching a devastating attack. In this research note by Gartner, learn how to implement better network segmentation to reduce or eliminate threats from spreading throughout your network. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|