Medical transcription software vendor Nuance is the latest company to acknowledge that it's still struggling to recover from the recent global NotPetya ransomware attacks and will see a dip in its financial performance as a result.
It's boom time for the ransomware business as criminals continue to make easy cryptocurrency paydays via crypto-locking attacks. AlienVault's Javvad Malik and Chris Doman detail how crowdsourced threat intelligence can help in the fight against this threat.
Group-IB's unparalleled knowledge of Russian speaking cybercrime has been ranked among the top by IDC, Gartner, and Forrester.
Download the free Forrester report to learn more about the provider which meets your threat intel needs and avoid those that supply "fluff".
Inside also learn practical tips on building...
Millions of connected devices already have been potentially compromised - inside and outside of the enterprise. Phil Marshall of Tolaga Research is concerned about when and how attackers will take advantage of these in the next big IoT strike.
Russian citizen Mark Vartanyan, aka "Kolypto," has been sentenced to serve five years in U.S. prison after he pleaded guilty to helping develop and distribute the notorious banking Trojan called Citadel.
Ricoh's Australia office has notified banks, government agencies, universities and many large businesses about a curious data breach that, in some cases, exposed login credentials for its multifunction devices.
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities.
Download this whitepaper that provides a course correction for the industry by clearly delineating the offerings of 30 vendors that provide...
An investigation into a single IP security camera has unfolded into yet another worrying finding in the land of the internet of things. Millions of IoT devices may have a remotely executable buffer overflow in an open-source code component, according to cybersecurity company Senrio.
While the U.K. is beefing up funding for hospital cybersecurity, in the U.S., some Congressional leaders are pushing for moves that could have the unintended consequence of sapping security investments by some healthcare providers.
Many organizations are at a disadvantage when they come up against today's cyber criminals. On one side are the criminals: sophisticated, well-funded, adaptive - always looking for new tools, techniques, procedures, and vectors to breach networks. On the other side are the defenders, hampered by legacy security...
Malware attacks are increasing, including ransomware like CryptoLocker, Locky, and zCrypt.
Businesses know it's essential to protect PCs from malicious programs, but many don't realize the value of server-level protection until the damage is done. Server-level protection from viruses and malware is essential, and...
Give the right users access to the right resources at the right times and for the right purposes.
Two-thirds of businesses have experienced data theft or corruption that originated within their organizations. But insider threats are difficult to control because your IBM i users need at least some level of access to...
Your users connect from many locations and devices. They no longer need the VPN to get work done. What if you had a fast, easy way to protect users anywhere they access the internet?
View this report that provides the 1st line of defense against threats on the internet.
44% of Security alerts aren't investigated
22% lost customers because of attacks
29% lost revenue as a result of attacks
What are you doing to stay secure in an expanding threat landscape?
View this report to see how your current security posture stacks up.