dcsimg

From the experts who also bring you:

eWeekLogo
ITBELogo
DeveloperLogo
eSFLogo
ServerwatchLogo
DatamationLogo

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Best Practices: Prepare & Recover Faster from Ransomware Attacks

 Live Webinar: July 24th, 2:30pm EST / 11:30 PST Ransomware is quickly becoming IT’s worst nightmare. With 300% year-over-year growth in ransomware incidents in 2018, equalling more than $8B in damage costs globally, organizations need to prepare for the increasing …

On-Demand Webinar: How To Thwart Email Attacks

In this webinar, Cylance Consulting Director Sig Murphy presents a comprehensive overview of the origins of business email compromise and evolving attack trends, providing you the information needed to proactively defend systems and endpoints from future attacks.

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it.  One advanced threat technique that is experiencing success is the use of fileless attacks, …

Achieving Program Integrity for Health Care Cost Containment Operations

Using analytics to transform health care costs for payer programs Health insurers have long been plagued by issues of fraud, waste, abuse, error and corruption. Taking an enterprise approach to payment integrity – one that combines advanced data management and …