The Need for a New IT Security Architecture: Global Study sponsored by Citrix and conducted by Ponemon Institute reveals global trends in IT security risks and reasons why security practices and policies need to evolve in order to
For months a bug in Cloudflare's content optimization systems exposed sensitive information sent by users to websites including passwords, session cookies, authentication tokens and even private messages.
The future of your business may depend on your choice of a colocation provider. Don't make the mistake of deciding based strictly on price. Make an informed choice. Our new whitepaper will teach you how to evaluate data centers on
The perfect companion for your iPhone, the iXpand Flash Drive lets you free up space on your iPhone, back up your camera roll, and even watch videos straight from the drive4. The flexible Lightning connector works with most cases and...
Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption
Our data security experts from Sophos and Druva will take a practical look at the before, during and after effects from a ransomware attack, including: How the security threat continues to evolve, How to monitor and predict security
What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...
After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.