As defenders increasingly use machine learning to remove spam, catch fraud, and block malware, concerns persist that attackers will find ways to use AI technology to their advantage. Machine...
Read moreSmall Businesses May Not Be Security’s Weak Link
June 23 2019Organizations with 250 or fewer employees often employ a higher percentage of security pros than their larger counterparts. Small businesses often have a bad reputation for being the gateway...
Read moreSmall Businesses May Not Be Security’s Weak Link
June 23 2019Organizations with 250 or fewer employees often employ a higher percentage of security pros than their larger counterparts. Small businesses often have a bad reputation for being the gateway...
Read moreCustomers of 3 MSPs Hit in Ransomware Attacks
June 23 2019Early information suggests threat actors gained access to remote monitoring and management tools from Webroot and Kaseya to distribute malware. UPDATE: 06/21/2019 This story has been updated to reflect...
Read moreCustomers of 3 MSPs Hit in Ransomware Attacks
June 23 2019Early information suggests threat actors gained access to remote monitoring and management tools from Webroot and Kaseya to distribute malware. UPDATE: 06/21/2019 This story has been updated to reflect...
Read moreThis special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity. Discover new opportunities to sharpen your skills...
Read moreThis special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity. Discover new opportunities to sharpen your skills...
Read morePatrolling the New Cybersecurity Perimeter
June 23 2019Remote work and other developments demand a shift to managing people rather than devices. The consumerization of IT has eroded the traditional line between “work” and “play.” Propelled by...
Read morePatrolling the New Cybersecurity Perimeter
June 23 2019Remote work and other developments demand a shift to managing people rather than devices. The consumerization of IT has eroded the traditional line between “work” and “play.” Propelled by...
Read morePledges to Not Pay Ransomware Hit Reality
June 22 2019While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay. When a Florida...
Read more
Recent Comments