Intelligent Enterprise Security
Cybercriminals add three novel tactics to phishing in latest...
Cybercriminals are continuously evolving their phishing attacks, introducing new techniques and tactics in their attempts to trick victims, bypass security measures and avoid detection. A new Threat Spotlight from Barracuda Networks details three novel tactics that were detected in phishing...
Five points to consider when hiring a hybrid cloud security...
In a scenario where data protection is essential, investing in integrated management companies can ensure security in IT structures. The use of the cloud for data management and storage has grown exponentially among companies of different sizes globally. In addition to simplifying access and...
FortiGuard Labs reports destructive wiper malware increases over...
Fortinet, a global cybersecurity leader driving the convergence of networking and security, has announced the latest semi-annual Global Threat Landscape Report from FortiGuard Labs. The threat landscape and organisations’ attack surface are constantly transforming and...
Yahoo most impersonated brand in Q4 2022 phishing attacks
Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cybersecurity solutions globally, has published its Brand Phishing Report for Q4 2022. The report highlights the brands that were most frequently imitated by cybercriminals in...
Features
Dynatrace extends cloud security to provide vulnerability analysis
New runtime environment vulnerability analytics and support for the Go programming language position Dynatrace as a solution that...
Expert advice for layering up your defences this World Password Day
The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We...
How ransomware is destabilising cyber insurance – and what to do about it
With the rise of Ransomware-as-a-Service (RaaS) techniques, double extortion attacks and the low cost of ransomware kits, unsustainable...
One in four Brazilian companies suffered cyberattacks last year
A study carried out by BugHunt with more than 50 companies in Brazil shows that phishing (28%), viruses (24%), ransomware (21%) and...
Insights
Simplifying security on the path to a multi-cloud future
CIOs and CISOs must shift their mindset from network-centric security to data-centric security in order to have visibility over their...
Counting the cost of the biggest BEC attacks
Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email...
Expert advice for layering up your defences this World Password Day
The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We...
Criminalizing cybercrime and raising the risk for cyberattackers
Dave Russell, VP, Enterprise Strategy, Veeam, tells us businesses must understand the responsibility they have to their customers and...
Case Studies
Harte Hanks Standardizes Data Protection, optimizes IT and increases efficiency with Veeam
Harte Hanks, a leading global customer-experience company, has chosen Veeam Availability Suite and Con tour Data Solutions, a...