Ransomware threats like Cryptowall, TeslaCrypt and Locky are on the rise, targeting organizations of all sizes.
Download this whitepaper and learn how to stay secure against these attacks and:
What's behind the current wave of ransomware attacks
Why ransomware attacks are so successful
Practical steps to...
USB devices and ports pose serious risks, and they aren't going away anytime soon. But researchers say they've developed a way to block malicious actions by USB devices to help prevent attacks such as "BadUSB."
Retailer Eddie Bauer is warning customers that their payment card data may have been compromised by point-of-sale malware during a six-month attack. The warning follows HEI Hotels & Resorts disclosing a 15-month malware attack affecting 20 locations.
Police have arrested an employee of U.K.-based accountancy and business software developer Sage Group after a data breach. Meanwhile, a report has emerged that some customers are using its software in an unsecured manner.
Vikrant Arora, CISO of NYC Health & Hospitals, offers the four most important questions a board must ask the CISO to get a good understanding of how the organization is addressing top cybersecurity concerns.
Is the recent breach at HEI Hotels & Resorts linked to the hack of POS systems provider MICROS? And have other POS vendors been breached as well? Security experts offer their analysis and size up vendor vulnerabilities.
Cybercriminals have become dangerously savvy at leveraging the seismic technology changes occurring in the healthcare sector in order to get their hands on sensitive patient data. Medical records are more lucrative for attackers than almost any other targeted information, leaving the healthcare industry in the...
This threat report explains the vulnerability behind the DHS US-Cert Alert for SAP, as well as how to mitigate it.
Download this white paper to better understand...
How to determine if your SAP systems are vulnerable
How to protect your SAP systems from real-world cyber attacks
The FBI is investigating the compromise of the DNC and related party organizations. The big question is whether the FBI will be able to definitively attribute the various hacks to Russia. Former special agent Leo Taddeo offers investigatory insights.
The apparent breach of a system support portal used by Oracle MICROS to remotely access and service MICROS point-of-sale systems has raised more questions than answers. What actually happened? Which data was compromised? And who waged the attack?
Due to the increase in security breaches over the past few years, you know that legacy approaches to data center security are not adequate. Micro-segmentation could be the answer - but what does it really mean and how do you do it? Read this solution overview to find out.
This brief explains why it's time to take the next step toward the software-defined data center, and apply network virtualization and micro-segmentation to the network. It empowers infrastructure architects to react quickly to prevent breaches.
Build a fundamentally more agile, efficient and secure application...
Discover how micro-segmentation, delivered through network virtualization, provides comprehensive data center security, accelerates delivery time, and enhances the agility of your data center. Download the eBook here.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX...
This handy guide highlights some of the key benefits of securing your data center from within using micro-segmentation. Get started now.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization featuring Intel® Xeon® processors and Intel® Ethernet...
Most enterprise IT professionals agree, securing the network only at the perimeter is inadequate for today's data centers. Modern attacks can exploit a perimeter-centric defense. In this paper, we show how VMware NSX enables security that is both ubiquitous and granular by integrating security functions into the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.