Tech news you may have missed: Nov. 10 – 17

This week’s trending news features a primer on Industrial IoT, new and upcoming features for Windows users and the latest cybersecurity threats. The post Tech news you may have... Read more »

Open source tool puts machine learning dataset analysis at data scientists’ fingertips

Comet released Kangas, an open-source smart data exploration, analysis and model debugging tool for machine learning. Kangas, available on GitHub, helps users understand and debug their data in a... Read more »

Tech news you may have missed Oct. 28–Nov. 3

New Microsoft 365 deployment tools, making OneDrive work on your iPhone, and a new Cranefly backdoor lead the top news for this week. The post Tech news you may... Read more »

5 Kali Linux tools you should learn how to use

Kali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. Kali Linux also comes with... Read more »

Product showcase: ESET’s newest consumer offerings

It’s no secret that antivirus software is as essential to your computer as a power cord. However, the threats don’t stop at your devices. For example, criminals that are... Read more »

Making Sense of EPP Solutions: Reading the 2022 MITRE ATT&CK® Evaluation Results

According to the Fortinet February 2022 Global Threat Landscape Report, industries worldwide experienced a dramatic 15x growth in ransomware volume over the past 18 months, with sustained volume throughout... Read more »

Cybersecurity and the Big Data Problem: Human Security Operations Alone Struggle to Keep Pace

Many of today’s cyberattacks are broken into multiple stages of activity, each of which on its own is often difficult to discern as malicious rather than benign. Discernment is... Read more »

Reduce Ransomware Risk With the Fortinet Security Fabric

Today’s organizations have a broad digital attack surface spanning a diverse set of devices, user locations, networks, and clouds, providing many avenues of entry and exfiltration for cybercriminals. Increasingly,... Read more »

IDC Building Ransomware Resilience

Ransomware has become a popular weapon in the hands of malicious actors who try to harm governments, businesses, and individuals daily. Ransomware is the final stage of a more... Read more »

Top Four Steps to Reduce Ransomware Risk

According to Gartner, the rapid evolution and sophistication of cyberattacks and the migration of assets to the hybrid multi-cloud create a perfect storm. IT leaders must integrate security tools... Read more »
Subscribe to our Newsletter