Search results for: “threat intelligence”
-
Ransomware Protection: How to Prevent Ransomware Attacks
The best way to prevent ransomware is also the best way to prevent any malware infection – to implement security best practices. Of course, if…
-
10 of the Best Patch Management Service Providers
Patch management services are becoming increasingly popular as the number of software and application vulnerabilities demanding fixes has overwhelmed IT and security teams. A major…
-
Vulnerability Management as a Service (VMaaS): Ultimate Guide
There are 20,000 or more new software and hardware vulnerabilities every year. It falls to IT security teams to determine where those vulnerabilities lie in…
-
How You Get Malware: 8 Ways Malware Creeps Onto Your Device
Malware can unleash devastating attacks on devices and IT systems, resulting in the theft of sensitive data and money, destruction of hardware and files, the…
-
AI in Cybersecurity: How It Works
There’s a never-ending battle going on between cyber defenders and attackers, and this plays out with security products too: As soon as a security vendor…
-
The History of Computer Viruses & Malware
If you’ve used a computer for more than 5 minutes, you probably know a thing or two about computer viruses and malware. On the modern…
-
Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites
A series of distributed denial of service (DDoS) attacks today briefly took down the websites of over a dozen U.S. airports, including those for Atlanta…
-
Security Data Lakes Emerge to Address SIEM Limitations
Every security team craves clear visibility into the endpoints, networks, containers, applications, and other resources of the organization. Tools such as endpoint detection and response…
-
Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study
Nearly a quarter of healthcare organizations hit by ransomware attacks experienced an increase in patient mortality, according to a study from Ponemon Institute and Proofpoint…
-
Top Network Detection & Response (NDR) Solutions
In the race to offer comprehensive cybersecurity solutions, the product known as network detection and response (NDR) is a standalone solution as well as a…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (78)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (340)
- News (9)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (352)
- Trends (200)
- Video (17)