Tag "Endpoint Security"

Back to homepage
Software

Taken by Ransomware? Certain Skills Required.

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Identity Theft

Retail data breaches continue to reach new highs

Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the past compared to

Software

Taken by Ransomware? Certain Skills Required

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Hardware/Network Software

Organizations Operating in the Digital World Need Multiple Layers of Defense

If cyber attacks seem to be escalating, it’s because they are. Every day seems to bring news of yet another major data breach, and increasingly it’s happening to to big

Software

Designing Employee Security Awareness Training That Works

Enterprises spend nearly $100 billion a year on cybersecurity, and despite sophisticated IT security defenses, one weak link – employees – remains a major vulnerability. Many attacks are stopped by firewalls, endpoint security

Hardware/Network

Digital transformation: Visibility compliance in a transitional world

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses digital transformation challenges, and illustrates what an organization has to do in order to stay compliant in this

Hardware/Network

The new endpoint security market: Growing in size and scope

Massive funding rounds by CrowdStrike and Cylance demonstrate that endpoint security may be the tip of the cybersecurity spear. Venture capital investments in cybersecurity companies are aggressive these days, but

Cloud

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.The concept of “end-to-end”

Cloud

Five on-the-Ground Insights on Implementing Endpoint Security in the Cloud

Today’s “access-everything-anywhere-anytime” mobile data environment is great news for business productivity and performance but on the flipside it’s also a huge opportunity for cybercriminals. The increasing multitude of endpoints represents

Hardware/Network

What is a Cybersecurity Technology Platform Anyway?

Vendors are pushing platforms, but features, functionality, and definitions vary. Here’s a list of “must have” cybersecurity platform attributes. At last week’s RSA Conference, you couldn’t walk more than 10