LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Carbonite: A Cornerstone for Ransomware Protection & Recovery

Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. …

Overly Managed Security

The cybersecurity issues facing most enterprise organizations won't be solved by simply adding more tools or more people. The real problem is that we've underestimated what our security tools and our security teams can do. What organizations need is the ability to automate the …

The Top 5 Tasks to Automate for Privileged Account Management and Security

Automating repetitive, rote tasks is a key component of doing more with less for any IT Operations group. And automating as many tasks as possible is the only way to keep up performance demands while meeting security requirements. You can save yourself an incredible amount of time and …

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …