SECURITY THREATS

Not a day passes without news of another major data breach, and with the stakes rising – from data loss to regulatory penalties that could put an organization out of business – the cost of doing nothing may soon exceed the cost of adequate security measures. We keep you informed of the latest ways that cybercriminals are attacking organizations, and keep you informed of the best practices and security technologies that will keep your data safe from hackers.

LATEST SECURITY THREATS ARTICLES

A Surge in Repeat Attacks: DDoS Attacks Stop Trains in Sweden

|

The attacks forced Sweden's transport administration to stop or delay trains, and took down its website and email system.

READ MORE

Google Rolls Out Advanced Protection for Personal User Accounts

|

The company announces new safeguards that protect users from phishing and malicious apps that can be used to steal data from their Google Accounts.

READ MORE

A Tale of Two Credit Card Breaches: Pizza Hut, Hyatt Expose Customer Data

|

Major breaches of payment card data continue to be a regular occurrence in the hospitality industry.

READ MORE

Ransomware Sales on the Dark Web Surged by 2,502 Percent in the Past Year

|

Sales grew from $250,000 in 2016 to more than $6.2 million in 2017, according to a recent report.

READ MORE

North Korean Hackers Hit U.S. Electric Companies with Spear Phishing Attacks

|

Researchers say the attacks appeared to be early-stage reconnaissance, not preparation for an imminent destructive attack.

READ MORE

TOP SECURITY THREATS RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

READ MORE

TYPES OF MALWARE

Here are some of the most common malware types and how to defend against them, from adware to worms and everything in between.

READ MORE

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

CYBER INSURANCE

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Graduate to Secure Networks in Higher Education

Most experts believe that it's not IF your network will be compromised, but WHEN. The volume of users and devices, especially with large-scale adoption of IoT, makes the university campus an easy target for a breach. ¬†Are you confident that your network is smarter than users, devices, and …

Debunking the Top Four Myths About DDoS Attacks

Distributed denial-of-service (DDoS) attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks related to Brazillian websites during the Olympics. But while volumetric attacks still reign supreme, there …

Harnessing the Power of Metadata for Security

Download the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power. Metadata is data about data or put another way, a kind of summary or high-level view of data. By providing security tools with summary takes of the packet …

Ponemon Institute's 2017 Cost of Data Breach Study: Global Overview

The industry's benchmark study independently conducted by the Ponemon Institute and sponsored by IBM Security. What are the implications and findings on the effects of a data breach to today's businesses? Ponemon Institute's latest study of over 419 organizations around the globe details …
 
SEE ALL WHITEPAPERS
 
The Increasing Complexity of Cyberwar: North Korean Hackers Stole Joint U.S.-South Korea War Plans

The Increasing Complexity of Cyberwar: North Korean Hackers Stole Joint U.S.-South Korea War Plans

|

The hackers stole 235 GB of military data, of which 182 GB still hasn't been identified.

READ MORE
Apache Patches Optionsbleed Flaw in HTTP Server

Apache Patches Optionsbleed Flaw in HTTP Server

|

Apache HTTPD 2.4.28 is now available, fixing a vulnerability that could have potentially enabled information disclosure.

READ MORE
FireEye Warns of Expanding FormBook Malware Attacks

FireEye Warns of Expanding FormBook Malware Attacks

|

Data stealing malware taking aim at Aerospace and Defense contractors in the U.S. and South Korea.

READ MORE
Russian Hackers Stole Highly Classified NSA Data via Third-Party Contractor

Russian Hackers Stole Highly Classified NSA Data via Third-Party Contractor

|

The hackers used Kaspersky Lab anti-virus software to locate the files, according to a recent report.

READ MORE