LATEST SECURITY NEWS AND ANALYSIS

NewsletterSECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Carbonite: A Cornerstone for Ransomware Protection & Recovery

Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. …

Mastering Security in the Cloud for Your Insurance Organization

On-demand WebcastThe insurance industry is facing increasing demands from policy-holders, agents—even employees to migrate business processes to the cloud in order to meet their growing demands and expectations for digital, self-service applications.While there is an upside to …

The Impact of Data Breaches on Reputation & Share Value

This Ponemon Institute research report examines how a company's reputation, share value, and customer loyalty can be affected by a data breach, from the perspective of IT practitioners and marketers. As part of its research, Ponemon surveyed consumers to learn their expectations about …

4 Myths About Credential Phishing

When it comes to phishing, knowledge is power. We tend to underestimate the impact of phishing on the enterprise and assume our existing defense strategies are sufficient to combat these attacks.To understand phishing means understanding one of the most common methods used by attackers …