Expert analysis
A look at the top seven ransomware attacks in the past decade
In part one of this series, we discussed exactly what ransomware is, including the effects of and motives behind different types of attacks. In this second article, I’ll look …
Not everything is sophisticated, let’s keep it simple
I don’t have dandruff. But if I did, then I could use a new sophisticated formula to cure my condition. Whether the problem is dandruff or a malware-related threat, the term …
Three keys to making technical debt manageable
Remember back to a time when you worked on a project in college or grade school. You’re pushing through the project, and there is one piece that’s completed, but you know if …
Six data security questions that every board needs to ask
As data breaches become a constant headline, data security should be a major concern for company boards everywhere. Unless a board member has been hired specifically to …
Black Friday: When is a deal too good to be true?
Black Friday, the American sales phenomenon that allegedly marked the time of year when retailers began to make a profit – moving from the ‘red’ to the ‘black’ – has …
5 cloud storage predictions for 2018
At this point, the cloud is old news. This does not, however, diminish its continuing impact on individuals and businesses worldwide. As cloud-based services strive towards …
Why hackers reuse malware
Software developers love to reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is …
South Korea Winter Olympics: Cyber lessons from the past
There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin …
Safeguard mobile devices: VPNs and personal firewalls are vital
As mobile devices have permeated every aspect of private and professional lives, users have become increasingly dependent on connecting to public hotspots – especially when …
For strong unified communications security, behavioral analytics is critical
If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding …
The long tail of phishing attacks
Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data …
Rise and evolution of ransomware attacks
Ransomware, malware that encrypts systems and then asks for a ransom to decrypt files and systems, has become more prevalent in recent years. In fact, two of 2017’s major …
Featured news
Resources
Don't miss
- The breaches everyone gets hit by (and how to stop them)
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about