Recipe Unlimited denies a ransomware attack impacted nine restaurant brands, despite an alleged ransom note that shows the bitcoin ransom demand ticking up daily. Read More ▶ |
|
| Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges. Read More ▶ |
| Many companies boast about going entirely digital, but continue to work with mountains of documents. Don't be that company. Read More ▶ |
| Now that they’re longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats. Read More ▶ |
| | Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The easily configurable Ping Identity software offers a good alternative to these two scenarios. Read More ▶ |
| Don't underestimate the impact of good cyber security housekeeping for preventing a successful attack. Read More ▶ |
| The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks. Read More ▶ |
| Editor’s Picks | |
|
|
|