Tech news you may have missed Oct. 28–Nov. 3

New Microsoft 365 deployment tools, making OneDrive work on your iPhone, and a new Cranefly backdoor lead the top news for this week. The post Tech news you may... Read more »

5 Kali Linux tools you should learn how to use

Kali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. Kali Linux also comes with... Read more »

Product showcase: ESET’s newest consumer offerings

It’s no secret that antivirus software is as essential to your computer as a power cord. However, the threats don’t stop at your devices. For example, criminals that are... Read more »

Making Sense of EPP Solutions: Reading the 2022 MITRE ATT&CK® Evaluation Results

According to the Fortinet February 2022 Global Threat Landscape Report, industries worldwide experienced a dramatic 15x growth in ransomware volume over the past 18 months, with sustained volume throughout... Read more »

Cybersecurity and the Big Data Problem: Human Security Operations Alone Struggle to Keep Pace

Many of today’s cyberattacks are broken into multiple stages of activity, each of which on its own is often difficult to discern as malicious rather than benign. Discernment is... Read more »

Reduce Ransomware Risk With the Fortinet Security Fabric

Today’s organizations have a broad digital attack surface spanning a diverse set of devices, user locations, networks, and clouds, providing many avenues of entry and exfiltration for cybercriminals. Increasingly,... Read more »

IDC Building Ransomware Resilience

Ransomware has become a popular weapon in the hands of malicious actors who try to harm governments, businesses, and individuals daily. Ransomware is the final stage of a more... Read more »

Top Four Steps to Reduce Ransomware Risk

According to Gartner, the rapid evolution and sophistication of cyberattacks and the migration of assets to the hybrid multi-cloud create a perfect storm. IT leaders must integrate security tools... Read more »

How an Intelligent Network Can Unburden IT Teams – Checklist

Today’s networks are expected to do more than deliver connectivity and bandwidth. To optimize performance and enable additional functionality, a network needs to be intelligent. The more intelligent the... Read more »

Detectree: Open-source tool simplifies data analysis for blue teams, reduces alert fatigue

Many companies struggle to understand malicious activity and its effects while a security incident is in progress. It eats up time and resources that defenders need to contain the... Read more »
Subscribe to our Newsletter