dcsimg

News - Article Archives - Page 9

Does Your Browser Block Cryptojacking Attacks?

March 29, 2018 |

Learn what you can do to limit the risk of in-browser cryptojacking attacks.

READ MORE

Secdo AI-Powered Incident Response Redefines Battle Against Malware

March 28, 2018 |

We review Secdo's incident response platform that combines endpoint protection with cloud-based AI to handle threats in real time.

READ MORE

Types of Firewalls: What IT Security Pros Need to Know

March 21, 2018 |

Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.

READ MORE

Email Security for Your Business

March 13, 2018 |

Every business uses email, yet many are unaware of email security threats. Here's what to worry about – and what to do about it.

READ MORE

Microsoft Patches Massive Remote Access Vulnerability

March 13, 2018 |

The flaw affects all versions of Windows.

READ MORE

Mitigating the Memcached DDoS Threat

March 03, 2018 |

The new attack vector was recently used to launch a record-breaking 1.35 Tbps attack on GitHub.

READ MORE

How to Defend Servers Against Cryptojacking

February 28, 2018 |

Learn how to take proactive steps to help mitigate the risk of becoming an unwitting accomplice to cryptojacking attack.

READ MORE

Endpoint Detection and Response Selection Tool

February 21, 2018 |

Use our tool to find out what endpoint detection and response solution is best for your business needs.

READ MORE

9 Top Secure Web Gateway Vendors

February 15, 2018 |

A look at top vendors in the market for web security gateway solutions, a critical tool for defending against web threats.

READ MORE

Why Bug Bounties Matter

February 12, 2018 |

Paying security researchers to help discover vulnerabilities is a winning formula. Find out more in this first part of a new eSecurityPlanet series on the bug bounty industry

READ MORE

AutoSploit: Making Massive Cyber Attacks Too Easy?

February 08, 2018 |

The tool automates the process of launching attacks on remote targets.

READ MORE

What is Cryptojacking and Why Is It a Cybersecurity Risk?

February 06, 2018 |

Learn about this emerging attack method and how it's impacting organizations around the world in this eSecurityPlanet series.

READ MORE

How to Set Up and Implement DMARC Email Security

January 24, 2018 |

Curious about DMARC? Learn how to set up a basic DMARC email security policy, including SPF and DKIM, in this eSecurity Planet tutorial.

READ MORE

10 Top Patch Management Solutions

January 19, 2018 |

Patch management might be the single most important security tool. We review 10 of the top patch management solutions.

READ MORE

What is DMARC and How Does it Improve Email Security?

January 12, 2018 |

The U.S. government is adopting DMARC to help improve email security, and most organizations should too. Learn the basics in this eSecurity Planet article.

READ MORE

Assessing the Impact of Meltdown and Spectre: Companies Rush to Mitigate the Threat

January 05, 2018 |

As Intel is hit with class action lawsuits, enterprises are working quickly to assess the potential impact of the flaws.

READ MORE

2018 IT Security Outlook: Attacks and Threats Get More Sophisticated

January 04, 2018 |

2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.

READ MORE

DDoS Attacks Increasingly Blended Multiple Attack Vectors in Q3 2017

December 29, 2017 |

The overall number of attacks rose by 15.6 percent over the previous quarter.

READ MORE

IObit Addresses Ransomware Epidemic in Advanced SystemCare Ultimate 11

December 29, 2017 |

The company's endpoint protection and PC optimization software suite now protects users from ransomware.

READ MORE

84 Percent of U.S. Healthcare Providers Have No Cyber Security Leader

December 28, 2017 |

And just 11 percent plan to add one in the coming year.

READ MORE