While the company was able to avoid falling victim to the ransomware, the attackers may have been able to access patient data.
The companies team up to head off the inevitable rise in security threats targeting application container environments.
When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.
Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).
The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.
And three quarters of SMEs have two or fewer IT security staff members, a recent survey found.
The company's NSE7000 appliance can deflect DDoS attacks under a minute with a negligible impact on network performance.
Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.
The OS is in use on a wide range of devices, including Galaxy Gear smartwatches and Z1, Z2 and Z3 phones.
And 53 percent haven't done so in more than a year, a recent survey found.
An analysis of data collected from over 24,000 Firebox appliances from WatchGuard reveals the daunting security landscape businesses face today.
Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.
And 74 percent feel vulnerable to such attacks, a recent survey found.
Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.