Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.
As companies become increasingly digital, they are recognizing the importance of sound digital investigations. More time is being spent investigating digital activity for the purposes of regulatory compliance, corporate policy
Our data security experts from Sophos and Druva will take a practical look at the before, during and after effects from a ransomware attack, including: How the security threat continues to evolve, How to monitor and predict security
With the rise in ransomware attacks, bank heists that reached new levels of sophistication, and extortion plots that were beyond anything we could have imagined, 2016 certainly was an eventful year for cybersecurity. Going into 2017,
Web app firewalls have the right idea - protect apps in production from attacks, but the execution is all wrong. It bogs down Security Teams with false alarms. We need to rethink how we approach application security. It's more than