Locky Returns with a New (Borrowed) Distribution Method A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises. Cybercrime Tactics & Techniques: Q1 2017 A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward. Securing your Privacy on Android If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.
How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? ...
Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Wondering where to ...
Infinera and Arista Networks collaborated with The Lippis Report to test an end-to-end datacenter interconnect (DCI) solution using Infinera's Cloud Xpress optical transport platform with Arista 100 Gb/s data center switches. The test results validated line-rate 100 gigabit Ethernet (GbE) throughput ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.