dcsimg

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Magic Quadrant for the Wired and Wireless LAN Access Infrastructure

Evolving enterprise requirements for greater access layer intelligence and automation continue to challenge networking vendors. Network service application choices made for the wired and wireless LAN impact other enterprise end-user applications, such as collaboration platforms, as …

Operationalizing Analytics for Intelligent Fraud Detection and Case Management

Fraud is widespread and continues to grow, especially online. It’s a major problem in a variety of industries and government agencies far beyond the familiar areas of financial and retail fraud. As fraudsters innovate and scale up, fraud prevention and investigation become more …

Evasive Phishing Targeting Office 365: What You Need to Know

On-Demand WebinarPhishing has become an industry, with new methods appearing and new "dark web" services increasing the evasiveness and sheer volume of both mass and targeted phishing threats. Join Cyren's senior threat analysts as they explain the latest phishing …

Best Practices for Advanced SaaS Management

Much like in our personal lives, subscription numbers are exploding in the professional world. The shift to the cloud is leading to subscriptions being purchased by more and different departments. Unfortunately, this ease of purchase makes it harder than ever for the enterprise to …