LATEST SECURITY NEWS AND ANALYSIS

Uplevel Systems Launches Secure SMB Suite

Aimed at small businesses and the MSPs that serve them, the bundle includes a firewall, IPS, secure DNS, VPN and other protections.

Read More

BlueBorne Vulnerability Hits Up to 20 Million Amazon Echo, Google Home Devices

Both companies have released security updates.

Read More

Threat Intelligence Firm ThreatQuotient Attracts $30 Million in Funding

The cybersecurity startup gets the attention of Cisco and Japanese telecommunications company NTT Docomo.

Read More

TOP IT SECURITY RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

Read More

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Read More

Flood of Attacks Spread Ransomware via Remote Desktop Protocol

Flood of Attacks Spread Ransomware via Remote Desktop Protocol

|

The attacks present a particular threat to small businesses.

READ MORE
SecTor: What the Story of David vs Goliath Teaches Cyber-Security

SecTor: What the Story of David vs Goliath Teaches Cyber-Security

|

While offensive attacks and zero-day vulnerabilities often grab headlines, understanding risk is the key to security.

READ MORE
Hacking Blockchain with Smart Contracts to Control a Botnet

Hacking Blockchain with Smart Contracts to Control a Botnet

|

Botract attack method revealed at SecTor security conference could enable a botnet to be as resilient and as distributed as the Ethereum blockchain itself.

READ MORE
Fear the Retailer: Forever 21 Hacked as Black Friday Approaches

Fear the Retailer: Forever 21 Hacked as Black Friday Approaches

|

The company doesn't yet know how many locations were affected.

READ MORE

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

ENTERPRISE MOBILITY MANAGEMENT (EMM)

Mobile end-user devices need to be managed to improve employee productivity and to reduce risks.

READ MORE

CLOUD ACCESS SECURITY BROKERS (CASB)

More companies are moving sensitive data to the cloud, increasing the need to secure that data.

READ MORE

SECURITY INCIDENT AND EVENT MANAGEMENT (SIEM)

SIEM products are no longer just for large enterprises. We'll help determine if SIEM is for you.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Hybrid Cloud for Dummies

In this book, learn the fundamentals of hybrid cloud: Manage visibility, control and security Handle deployments in hybrid cloud environments Realize and recognize the business impact of hybrid cloud

The Definitive Guide to Secure File Sharing

In the interest of faster workflows and better collaboration, employees are now sharing files containing sensitive or proprietary data more than ever before, both internally and externally. When these files move beyond the enterprise's security perimeter, they become vulnerable to a range …

The Cybersecurity Blueprint: A Four-Part Model for Providing Comprehensive Layered Security

While ransomware has received the most headlines, other cyberthreats have grown in their severity as well. If you're an IT service provider, dealing with the sheer variety of attacks today requires that you take a broad, layered approach to security for your clients. But where do you …

Building Secure Multi-Factor Authentication

As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
 
SEE ALL WHITEPAPERS
 
Barracuda Floats Cloud Generation Firewalls

Barracuda Floats Cloud Generation Firewalls

|

The company's updated NextGen Firewall and Web Application Firewall offerings are now ready to tackle cloud application security challenges.

READ MORE
How to Achieve an Optimal Security Posture

How to Achieve an Optimal Security Posture

|

Complete and total security is out of the question, so which IT security technologies will get you to your ideal security posture? We outline your options.

READ MORE
45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

|

Still, 89 percent say they're confident in their organization's cyber security stance.

READ MORE
How the Government  of Canada Plans To Set CyberSecurity Policy

How the Government of Canada Plans To Set CyberSecurity Policy

|

At SecTor security conference, the Director General for National Cyber Security in the Government of Canada details her government's policies for keeping Canadians safe online.

READ MORE