Organizations must adopt a multi-layered, defense-in-depth approach to online security to combat today's threat landscape. Rather than relying on just one or two of the so-called 'next-gen' techniques in isolation, a robust, multi-layered approach should involve a vast array of signature- and non-signature based...
Although they are only part of an effective strategy, enterprises need to ensure they have the right endpoint security solution in place to keep both valued data and users secure.
Download this whitepaper that covers endpoint security and explores top vendors, vendors disrupting the market as well as emerging...
To handle new forms of threats like cyber espionage or ransomware enterprises need to evolve their endpoint protection solutions to cover all threat surfaces.
Download this whitepaper to review the effectiveness of seven different products, on several different attack vectors and learn how you can make your...
For businesses to achieve their digital transformation goals, IT teams must do an increasingly better job to ensure system availability and protection. In this survey of over 1,000 global IT decision makers, it was found that enterprises had a startling high amount of unreliably recoverable data within their...
IT environments continue to evolve beyond physical servers. Today, many important production resources operate on virtual machines (VMs) running on multiple hypervisors, and more organizations have been moving their mission-critical business processes offsite to the cloud. As a result, the requirements for protecting...
Understanding cost and complexity drivers is important when evaluating options for data protection and availability, as cost has several dimensions beyond acquisition. Staff costs, operational costs, migration costs, licensing models, and, most importantly, the cost of doing nothing have to be considered.
So how...
In an ever-evolving market, one thing remains the same: Who will win the race? In this case, it's the race to zero. As data availability service-level agreements (SLAs) are forced to constantly shrink under the expectation of zero downtime and zero data loss, organizations are turning to the market in search of the...
The critical Active Management Technology flaw in many Intel chipsets' firmware can be remotely exploited using any password - or even no password at all - to gain full access to a system, security researchers warn. Numerous systems and even ATMs will require forthcoming firmware fixes.
The latest draft version of the Trump administration's cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Obama White House.
The Department of Homeland Security is warning IT service providers, healthcare organizations and three other business sectors about a sophisticated cyberattack campaign that involves using stolen administrative credentials and implanting malware on critical systems.
Hackers have reportedly exploited the SS7 mobile telecommunications signaling protocol to drain money from online bank accounts used by O2 mobile phone subscribers. Despite rising security worries relating to SS7, many telcos have yet to explore related fixes.
Many companies today design their cyber security strategy around an incident centric approach - how & when did the hack occur? But this approach leaves out a critical component that can be the difference between a reactive and proactive strategy, the threat actor behind the hack. Join us to learn how a cyber strategy...
Organizations have more endpoints today than ever, and securing those endpoints is challenging, because it's rare that any one organization is responsible for all the endpoints that touch its network and servers, says Mike Spanbauer, vice president of research and strategy at NSS Labs.
Score another one for social engineering: A phishing campaign used a bogus "Google Docs" app to trick people into surrendering full access to their Google accounts and contacts. Before Google squashed the campaign, up to 1 million of its users may have fallen victim.
Biometric adoption and demand by consumers is increasing rapidly. Next-gen solutions now exist for organizations to bring secure, frictionless authentication to their consumers using biometric solutions.
Download this eBook about biometrics and authentication that discusses:
Problems biometrics can solve for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.