SECURITY THREATS

Not a day passes without news of another major data breach, and with the stakes rising – from data loss to regulatory penalties that could put an organization out of business – the cost of doing nothing may soon exceed the cost of adequate security measures. We keep you informed of the latest ways that cybercriminals are attacking organizations, and keep you informed of the best practices and security technologies that will keep your data safe from hackers.

LATEST SECURITY THREATS ARTICLES

New Attacks Spread Ransomware via Remote Desktop Protocol

|

The attacks present a particular threat to small businesses.

READ MORE

Fear the Retailer: Forever 21 Hacked as Black Friday Approaches

|

The company doesn't yet know how many locations were affected.

READ MORE

45 Percent of IT Pros Expect a Major, Disruptive Cyber Attack Within the Next Year

|

Still, 89 percent say they're confident in their organization's cyber security stance.

READ MORE

Two Thirds of Americans Worry About Hackers, Identity Theft

|

In comparison, just 38 percent worry about their car being stolen or broken into, a recent survey found.

READ MORE

63 Percent of IT Security Experts Are Unsure How to Fight Targeted Attacks

|

Still, 78 percent of IT business decision makers say they already spend enough, or too much, on protection from such attacks.

READ MORE

TOP SECURITY THREATS RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

READ MORE

TYPES OF MALWARE

Here are some of the most common malware types and how to defend against them, from adware to worms and everything in between.

READ MORE

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

CYBER INSURANCE

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Harnessing the Power of Metadata for Security

Download the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power. Metadata is data about data or put another way, a kind of summary or high-level view of data. By providing security tools with summary takes of the packet …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

The Cybersecurity Blueprint: A Four-Part Model for Providing Comprehensive Layered Security

While ransomware has received the most headlines, other cyberthreats have grown in their severity as well. If you're an IT service provider, dealing with the sheer variety of attacks today requires that you take a broad, layered approach to security for your clients. But where do you …

Dealing With a Data Breach: Before. During. After.

The report, together with the annual Ponemon Cost of a Data Breach Study that put the average cost of a data breach at USD 4 million, underscores the critical importance of proactive preparedness in today's threat-filled online world. As criminals and their methodologies become …
 
SEE ALL WHITEPAPERS
 
Report Finds NHS WannaCry Attacks Were Easily Avoidable

Report Finds NHS WannaCry Attacks Were Easily Avoidable

|

NHS trusts had been warned to apply patches months before the attack.

READ MORE
Dark Web Marketplace Offers Remote Access to Corporate PCs for $3-15 Each

Dark Web Marketplace Offers Remote Access to Corporate PCs for $3-15 Each

|

Ultimate Anonymity Services offers more than 35,000 RDPs for sale, including about 300 from the U.S.

READ MORE
Understanding the Threat: Bad Rabbit Ransomware Spreads Worldwide

Understanding the Threat: Bad Rabbit Ransomware Spreads Worldwide

|

Early victims include the Interfax news agency and Ukraine's Ministry of Infrastructure.

READ MORE
Reaper Botnet Leverages Millions of Vulnerable IoT Devices

Reaper Botnet Leverages Millions of Vulnerable IoT Devices

|

The botnet has the potential to launch a devastating DDoS attack.

READ MORE