The Need for a New IT Security Architecture: Global Study sponsored by Citrix and conducted by Ponemon Institute reveals global trends in IT security risks and reasons why security practices and policies need to evolve in order to
For months a bug in Cloudflare's content optimization systems exposed sensitive information sent by users to websites including passwords, session cookies, authentication tokens and even private messages.
Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption
The perfect companion for your iPhone, the iXpand Flash Drive lets you free up space on your iPhone, back up your camera roll, and even watch videos straight from the drive4. The flexible Lightning connector works with most cases and...
Today, organizations are focused heavily on core competencies and keys to success. This - coupled with the rapid growth of software as a service (SaaS) - has led to increased outsourcing of certain business functions to vendors who
Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining which AEP product is the best fit can be challenging.
What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...
After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.