Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change. The growing sophistication of tools and techniques for protecting people...
Read moreSmart Home Devices
March 8 2019The SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read moreSmart Home Devices
March 8 2019The SANS Institute provides training related to cybersecurity and the safe use of technology within your organization. To provide this training, the SANS Institute captures and processes personal data...
Read moreAs more enterprise work takes place on mobile devices, more companies are feeling insecure about the security of their mobile fleet, according to a new Verizon report. RSA CONFERENCE...
Read moreAs more enterprise work takes place on mobile devices, more companies are feeling insecure about the security of their mobile fleet, according to a new Verizon report. RSA CONFERENCE...
Read more4 Ways At-Work Apps Are Vulnerable to Attack
March 8 2019Collaboration applications make users and IT teams more efficient. But they come with an added cost: security. They haven’t completely replaced phone calls or email, but communication and collaboration...
Read more4 Ways At-Work Apps Are Vulnerable to Attack
March 8 2019Collaboration applications make users and IT teams more efficient. But they come with an added cost: security. They haven’t completely replaced phone calls or email, but communication and collaboration...
Read moreSOAR, or Security Orchestration, Automation and Response, helps customers ensure the sanctity of their infrastructure, data and end-users, according to Sanjay Ramnath, vice president, product marketing, of ATT Cybersecurity....
Read moreSOAR, or Security Orchestration, Automation and Response, helps customers ensure the sanctity of their infrastructure, data and end-users, according to Sanjay Ramnath, vice president, product marketing, of ATT Cybersecurity....
Read moreDeep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company’s security posture, says Deep Instinct’s Guy Caspi. Deep...
Read more
Recent Comments