Ransomware has been around since 2013, but it was the success of CryptoLocker that spawned a booming vertical market for criminals. The effect of Ransomware has been felt by organizations both large and small; each of them well aware of the risks associated with this type of malware. Some even had, what they assumed, were solid defenses against this type of attack - but their assumptions were wrong. Read More ▶ |
|
| Video/Webcast: Check Point Software Technologies Ltd. Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More ▶ | Apple and the U.S. Department of Justice will argue in court Tuesday about whether a judge should require the tech giant help the FBI unlock an iPhone used by a mass shooter in California. Read More ▶ |
| The FBI says it may have discovered a way to break into the iPhone used by one of the San Bernardino mass shooters, and an important court hearing in the case that was scheduled for Tuesday has been postponed. Read More ▶ |
| If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right. Read More ▶ |
| | White Paper: SecureAuth SecureAuth is pushing the limits of Adaptive Authentication by introducing behavioral biometrics. Behavioral biometrics is another method for detecting threats with the ability to monitor and analyze keystrokes, mouse movements, and touch dynamics. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|