After researchers found the security apps collecting and uploading users' browser histories, Apple removed the apps from its macOS app store and Trend Micro removed the apps' browser history collection capability.
Today's security operations center is all about reducing the number of alerts with emerging technologies - and enhancing old-school human collaboration. Here's how some real-world SOCs are evolving.
In this session, we'll offer strategies and tips for IT leaders and staff to serve their users and customers -- both internal and external -- by understanding the behaviors and business outcomes that are most important.
View a live demonstration of a cloud-based customizable platform that provides real-time empirical data regarding the effectiveness of enterprise security controls and also reveals the operating systems and applications most often targeted by today's active threats.
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.