The Cybersecurity Measures CTOs Are Actually Implementing
Companies look to multifactor authentication and identity and access management to block attacks, but hedge their bets with disaster recovery.
Companies look to multifactor authentication and identity and access management to block attacks, but hedge their bets with disaster recovery.
By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of…
In a great many ransomware attacks, the criminals who pillage the victim's network are not the same crooks who gained…
By Jason Stirland, CTO at DeltaNet International According to research by Proofpoint, 75% of organizations around the world experienced […] The…
With the holidays these past two weeks, there have been only a few known ransomware attacks and little research released.…
QNAP has warned customers today to secure Internet-exposed network-attached storage (NAS) devices immediately from ongoing ransomware and brute-force attacks. [...]
Organizations need to take matters into their own hands with a new approach.
The healthcare sector has been the target of hundreds of cyberattacks this year. A tally of public data breach reports…
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold…
Users of QNAP network-attached storage (NAS) devices are reporting attacks on their systems with the eCh0raix ransomware, also known as…