Last Friday’s massive WannaCry ransomware attack means victims around the world are facing a tough question: Should they pay the ransom? Those who do shouldn't expect a quick response -- or any response at all. Even after payment, the ransomware doesn’t automatically release your computer and decrypt your files. Read More ▶ |
|
| White Paper: Viavi Solutions The Tenth Annual State of the Network Global Study focuses a lens on the network team's role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. Read More ▶ | IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure. Read More ▶ |
| The ThermoPro TP03A is an effective solution to achieve the most accurate temperature in a matter of seconds. Read More ▶ |
| Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized database. Read More ▶ |
| | Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat. Read More ▶ |
| Learn what to expect from this new class of security-focused, container-based cloud platforms. Read More ▶ |
| The French data protection watchdog has imposed its harshest penalty on Facebook for six breaches of French privacy law. Read More ▶ |
| As the WannaCry ransomware attack evolves, more cybercriminals are likely to attempt to profit from the vulnerability it exploits and similar flaws in the future. Read More ▶ |
| White Paper: Viavi Solutions The right Application Performance Management (APM) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) solutions. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|