July 27, 2016 Added by:Dan Lohrmann
The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content.
July 27, 2016 Added by:Slawek Ligier
There is certainly no shortage of cyber-attacks in the headlines, and none more prevalent than ransomware attacks. These bold attacks encrypt user files, then demand a ransom in exchange for decrypting the files and restoring access to the original owner.
July 25, 2016 Added by:InfosecIsland News
SecurityWeek and Palo Alto Networks will host a live network security webinar on Wednesday, July 27th at 1:00PM ET: Five Steps to a Secure Hybrid Architecture.
July 21, 2016 Added by:Paul Shomo
I see wisdom behind the instinct to resist information authority. Human hierarchy tends to pyramid into increasingly fewer numbers up top. If you're going to fight for rights, there are more individuals at the bottom and more power to abuse from above.
July 14, 2016 Added by:Nimmy Reichenberg
Now, more than ever then, it’s vital that organizations work to bring security and application delivery closer together.
July 13, 2016 Added by:Steve Durbin
When it comes to cyber security, it’s more important than ever for board members and core executives—especially those not directly involved with deploying security programs—to fully participate and contribute on a continuous basis.
From Production Slumps to Industrial Espionage: Why the Manufacturing Sector Must Be Better Prepared for Cyber Attacks
July 12, 2016 Added by:Mirko Brandner
In a connected world, where digitization progresses rapidly and finds its way into our factories, we are inevitably faced with an ever-increasing level of vulnerabilities that lead to security breaches.
July 07, 2016 Added by:Ionut Arghire
Cyber-extortion is becoming a booming business, at least for criminals who threaten companies with distributed denial of service (DDoS) attacks, a recent survey from DDoS protection company Corero reveals.
July 06, 2016 Added by:Mike Paquette
By augmenting their efforts with behavioral analytics and machine learning, teams can be sure they reduce alert noise and fatigue while quickly identifying and addressing the issues that actually matter before they hurt their customers or the bottom line.