-
‘Tis the season for spam and scams: Navigating the influx of unwanted messages (Post)
With the holiday season right around the corner, cybercriminals are ramping up their efforts to initiate spam and scam campaigns through different mediums, with the most popular being email and third ...
-
Innovating with responsibility: How customers and partners are bridging data, AI and trust with the Microsoft Cloud (Post)
For the past decade, we have been on a journey with our customers to help them achieve digital transformation, which is business transformation empowered by cloud technology. With increasing exciteme ...
-
Responding to Coronavirus: Six Ways to Improve App Availability and Performance for Your End Users (Post)
The impact of coronavirus (COVID-19) on organizations around the world has been significant, altering day-to-day life for millions of people. Each one of us is grappling with challenging personal iss ...
-
The Seven Dimensions of Security Culture: Attitudes (Post)
KnowBe4’s Security Culture Report is the result of data collected from 120,000 global employees in the following industries: Banking, Financial Services, Insurance, Consulting, Business Services, Tec ...
-
7 Factors to Consider When Evaluating Endpoint Protection Solutions (Post)
The threat landscape is evolving. Attackers are getting craftier with infiltrating secure environments. Is your endpoint protection able to keep up? In many cases, organizations just aren’t sure.The ...
-
Driving Automated Threat Prevention & Security Policy Orchestration (Post)
The dramatic increase in cyberattacks like ransomware, zero day, and supply chain are fundamentally changing how we should be approaching cybersecurity. Targeted advanced persistent threats place ...
-
The Risk of Redirector Domains in Phishing Attacks (Post)
Researchers at GreatHorn warn that a large-scale phishing campaign is using open redirects to evade email security filters. Open redirects allow attackers to take a URL from a non-malicious website a ...
-
Coronavirus con artists continue to spread infections of their own (Post)
From malware-laden emails to fake donations, these are some of the most common cons you should watch out for amid the public health crisisWith the COVID-19 pandemic surging outside, people are hunk ...
-
A New Devilish Malware Worm Called Lucifer Is Targeting Your Windows Workstations (Post)
Palo Alto Networks’ Unit 42 Security experts have identified a malware worm called Lucifer, that targets Windows systems with cryptojacking and distributed denial-of-service (DDoS) attacks.This brand ...
-
VMware Private AI Foundation with NVIDIA Server Guidance (Post)
Recently at the NVIDIA GTC Conference 2024, the initial availability of VMware Private AI Foundation with NVIDIA was announced, powering the era of AI in your data center. VMware Private AI ...
-
The Urgent Need for Network Security (Post)
Threat PreventionThreat prevention is high on everyone’s list in 2020. After all, organizations share the same goal: to protect their enterprise by ensuring the safety of their trade secrets and th ...
-
Wireless Security in a 6 GHz Wi-Fi 6E World (Post)
This is the third in a series of continuing blogs about Wi-Fi 6E and the new spectrum bonanza in the 6 GHz frequency band. This blog will summarize the latest Wi-Fi security certification enhancem ...