Search results for: “threat intelligence”
-
Black Hat: Building a Ransomware Resilient File System with ShieldFS
LAS VEGAS — The scourge that is ransomware has dominated security headlines over the last year, with large outbreaks like WannaCry and NotPetya shutting down…
-
NotPetya Cyber Attacks Point to a Need for Comprehensive Risk Management
Earlier this week, Ukrainian police seized servers belonging to accounting software provider Intellect Service as part of an investigation into last month’s massive NotPetya ransomware…
-
Tanium: EDR Product Overview and Insight
See the complete list of top 10 Endpoint Detection and Response solutions. Company description: Founded in 2007, Tanium views itself as the central nervous system…
-
Top 11 Cyber Security Technologies
At the recent Gartner Security & Risk Management Summit 2017, company analysts predicted that the following 11 technologies will be the top solutions in…
-
Massive Ransomware Outbreak Spreads to 74 Countries
On Friday, a version of the WannaCry ransomware hit tens of thousands of computers in 74 countries worldwide in a matter of hours, according to…
-
How to Hire an Ethical Hacker
By Ryan O’Leary, WhiteHat Security If your company develops web applications, I hope you aren’t the nervous sort when I tell you that your website…
-
48 Percent of Companies Don’t Inspect the Cloud for Malware
A recent survey of 643 IT and IT security practitioners in the U.S. and Canada found that fully 48 percent of respondents don’t inspect the…
-
How to Bake Better Security into Applications
Developers are being urged to create applications at an ever-faster pace, with many of them designed to operate on the Web or run on mobile…
-
How to Avoid a Hacktivist Attack
Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives – according to Verizon’s 2012 Data Breach Investigations Report…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (77)
- Compliance (35)
- Cybersecurity (33)
- Endpoint (74)
- Mobile (41)
- Networks (339)
- News (6)
- Products (366)
- Security (1)
- Sponsored (1)
- Threats (351)
- Trends (199)
- Video (17)