SECURITY THREATS

Not a day passes without news of another major data breach, and with the stakes rising – from data loss to regulatory penalties that could put an organization out of business – the cost of doing nothing may soon exceed the cost of adequate security measures. We keep you informed of the latest ways that cybercriminals are attacking organizations, and keep you informed of the best practices and security technologies that will keep your data safe from hackers.

LATEST SECURITY THREATS ARTICLES

14 Percent of Office Workers Aren't Sure What Phishing Is

|

And 21 percent have fallen victim to phishing attacks, a recent survey found.

READ MORE

27 Percent of IT Pros Will Continue Using CCleaner Despite Malware Threat

|

And another 32 percent haven't yet decided whether they will or not, a recent survey found.

READ MORE

Open Source Summit: Securing IoT is About Avoiding Anti-Patterns

|

There are a lot of different pitfalls when it comes to IoT security that developers need to avoid.

READ MORE

New Bluetooth Attack Affects Billions of Devices Worldwide

|

The exploit, which requires no user interaction, can give the attacker control of the affected device.

READ MORE

Protecting Big Data: Over 26,000 MongoDB Servers Hit by Ransom Attacks

|

In many cases, companies that paid the ransom were scammed -- the data had simply been wiped.

READ MORE

TOP SECURITY THREATS RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

READ MORE

TYPES OF MALWARE

Here are some of the most common malware types and how to defend against them, from adware to worms and everything in between.

READ MORE

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

CYBER INSURANCE

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

Digital Digest on Data Security

In today's competitive environment, enterprises need to earn their customers' trust every day. Help show them how by making each and every experience frictionless and their data secure.

How to Choose the Right Cybersecurity Solution

On-demand webcast Lately it seems that everywhere you turn, there's another cybersecurity breach — and hackers and thieves are never satisfied with the status quo, continuing to refine their tactics or create new methods of attack. So how do you protect your business now, but also …

Harnessing the Power of Metadata for Security

Download Gigamon's white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power. Metadata is data about data or put another way, a kind of summary or high-level view of data. By providing security tools with summary takes of the packet …
 
SEE ALL WHITEPAPERS
 
Lenovo Settles Superfish Privacy Claims with U.S. FTC for $3.5M

Lenovo Settles Superfish Privacy Claims with U.S. FTC for $3.5M

|

The simple lesson in this case is to not pre-install software that violates user privacy.

READ MORE
Equifax Web Application Vulnerability Exposes 143 Million Social Security Numbers

Equifax Web Application Vulnerability Exposes 143 Million Social Security Numbers

|

The exposed information also includes names, birthdates and addresses, as well as some driver's license numbers, credit card numbers and other data.

READ MORE
Critical Infrastructure Compromised: New Cyber Attacks Hit Energy Companies in U.S., Turkey, Switzerland

Critical Infrastructure Compromised: New Cyber Attacks Hit Energy Companies in U.S., Turkey, Switzerland

|

The Dragonfly group now appears to be focused on compromising operational networks.

READ MORE
Apache Struts Update Patches Critical Vulnerabilities

Apache Struts Update Patches Critical Vulnerabilities

|

Widely used Java framework is once again updating for some highly impactful issues.

READ MORE