strategy
What are script-based attacks and what can be done to prevent them?
Attackers always seek out new ways to evade detection. As most endpoint security products handle file-based attacks relatively well, scripts are an excellent way for attackers …
How do I select an endpoint protection solution for my business?
Endpoint protection has evolved to safeguard from complex malware and evolving zero-day threats. To select an appropriate endpoint protection solution for your business, you …
The average total cost of a data breach declined, but costs increased for many organizations
Data breaches cost companies $3.86 million per breach on average, and compromised employee accounts are the most expensive root cause. Based on in-depth analysis of data …
Delivering and maintaining security at the speed of digital transformation
Dustin Rigg Hillard, CTO at eSentire, is responsible for leading product development and technology innovation. His vision is rooted in simplifying and accelerating the …
Things to consider when selecting enterprise SSDs for critical workloads
The process of evaluating solid state drives (SSDs) for enterprise applications can present a number of challenges. You want maximum performance for the most demanding servers …
Security teams increasingly stressed due to lack of proper tools, executive support
93% of security professionals lack the tools to detect known security threats, and 92% state they are still in need of the appropriate preventative solutions to close current …
Review: Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham holds a Ph.D. and M.S. in computer science from Colorado Technical University and a B.S. from American Military University focused on counter-terrorism …
The distinction between human and bot behavior is becoming increasingly blurred
There’s no denying that the way people have been using the Internet and online stores has changed over the last couple of months. As consumers change their online habits, the …
What is privacy and why does it matter?
Privacy is a basic right and a necessary protection in the digital age to avoid victimization and manipulation. In much of the world, privacy is considered a basic human …
It’s time to tap the next generation of cyber defenders
As college graduates of the Class of 2020 enter the workforce, we welcome a new generation of cyber professionals. Already this year’s crop of talent has demonstrated their …
Data crisis: Companies pivot from disruption to transformation
Only 10% of organizations are using data effectively for transformational purposes, according to NTT DATA Services. While 79% of organizations recognize the strategic value of …
Ransomware recovery: Moving forward without backing up
Phishing scams tied to COVID-19 show no signs of stopping. More than 3,142 phishing and counterfeit pages went live every day in January, and by March, the number had grown to …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)