The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec. Read More ▶ |
|
| Webcast: CA Technologies Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More ▶ | Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security. Read More ▶ |
| This extremely soft, high-quality and machine-washable microfiber material absorbs and safely removes dust, oil smudges, fingerprints, and dirt from eyeglasses, camera lenses, computer screens, televisions, and other delicate surfaces. Currently listed at 33% off for a 30-pack. Read More ▶ |
| The latest campaigns are bigger, more sophisticated, and causing far more damage as the attackers learn new techniques and collaborate with other groups Read More ▶ |
| | A new update will occur monthly, or sometimes more often. Read More ▶ |
| Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of attack in the manufacturing, public sector, and education Read More ▶ |
| The way to understand, and avoid, becoming a victim of ransomware is to be prepared, said LEO Cyber Security CTO Andrew Hay. And part of that preparation is to understand its historical roots. Read More ▶ |
| The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs Read More ▶ |
| White Paper: NetApp Not only are diverse types of unstructured data growing at a phenomenal rate, but data is being created and stored in an increasingly distributed fashion- across on-premises infrastructures, colocation centers, and public clouds- which further complicates the security challenge. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|