dcsimg

LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Evasive Phishing Targeting Office 365: What You Need to Know

On-Demand WebinarPhishing has become an industry, with new methods appearing and new "dark web" services increasing the evasiveness and sheer volume of both mass and targeted phishing threats. Join Cyren's senior threat analysts as they explain the latest phishing …

Operationalizing Analytics for Intelligent Fraud Detection and Case Management

Fraud is widespread and continues to grow, especially online. It’s a major problem in a variety of industries and government agencies far beyond the familiar areas of financial and retail fraud. As fraudsters innovate and scale up, fraud prevention and investigation become more …

IDC Futurescape

IT leaders have never had so much choice in their infrastructure strategies, both on-premises and in a hybrid or off-premises world. With this choice comes the potential to positively impact budgets, staffing, operational effectiveness, and business outcomes. This IDC study …

The Continuum of Cloud Native Topologies

In this white paper, John Morello, Chief Technology Officer at Twistlock, shares a helpful model of viewing the different cloud native technologies as a continuum, to address different scenarios and efficiently choose which combination of technologies work best for running different …