The Evolution of Ransomware
Ransomware has been dominating the news for several weeks, and is likely to stay in the news for most of the year. Ransomware is a distinct type of cyber attack, in that it extorts payment from the victim in exchange […]
Ransomware has been dominating the news for several weeks, and is likely to stay in the news for most of the year. Ransomware is a distinct type of cyber attack, in that it extorts payment from the victim in exchange […]
Thanks to Mark Zuckerberg’s recent highly publicized social media account issues, most executives probably received a serious talking-to from their security chiefs about the need to frequently update and change their passwords on social media. While losing control of an
It is ironic that no tech topic is as befuddling to people as the cloud, and yet in reality most of us use it in some form or another many times a day, via all the various apps and services
Time Inc. confirmed just before the Memorial Day weekend that data was compromised from the MySpace social network. The company issued a statement that the compromised data is limited to MySpace usernames, passwords and email addresses from an old version
Join Vera on Thursday, May 26 at 1pm Eastern, 10am Pacific for a free webinar entitled, Protect Files, Beyond Dropbox & Email. Grant Shirk, Senior Director of Product Marketing for Vera, is the featured speaker. While some organizations sanction the
Vera Webinar: Protect Files, Beyond Dropbox & Email Read More »
In an ideal world we would be able to detect and prevent all attacks and our networks and devices would never be compromised in the first place. That Utopian vision is pure fantasy, though. No matter how hard we try,
Attackers may be in your network right now. It sometimes takes weeks or months for an organization to detect a compromise while the attacker takes his or her time conducting recon on your network, spreading to different endpoints and servers,
Detect a Compromise Before You Become the Next Data Breach Headline Read More »
The success of a phishing attack is essentially a function of just how authentic it looks. Security researchers at Barracuda have encountered a new phishing attack that targets Facebook business pages by posing as a Facebook compliance message that appears
When we talk about network and endpoint security, we would ideally like to prevent unauthorized access or compromise completely. That simply isn’t practical, though. Ultimately, what we want to protect and defend is the data housed on the network and
Learn How to Effectively Monitor and Protect Your Data Read More »
Information security threats are worsening by the day. Organizations risk becoming disoriented and losing their way in a maze of uncertainty, as they grapple with complex technology, proliferation of data, increased regulation, and a debilitating skills shortage. With the global
Threats on the Horizon for Tomorrow’s Global Security Landscape Read More »