- Filter by:
-
Topic
-
BIOS Security - The Next Frontier for Endpoint Protection
Everyone is familiar with the process of booting up a computer. Many of us do this every day - pressing the power button, hearing the startup sound, and seeing the home screen appear. But even some tech professionals may not be aware of what's happening under the surface of their...
Find Out More -
BIOS Security - The Next Frontier for Endpoint Protection
Everyone is familiar with the process of booting up a computer. Many of us do this every day - pressing the power button, hearing the startup sound, and seeing the home screen appear. But even some tech professionals may not be aware of what's happening under the surface of their...
Find Out More -
Cyber AI for SaaS Security: Protecting Your Dynamic Workforce
To protect today's dynamic workforce, security teams must be equipped to discern when and how a trusted account has been leveraged for nefarious purposes. This requires more than just an understanding of 'good' vs 'bad' - it requires an 'immune system' approach to security that is not only adaptive, but...
Download Now -
Email Security Threat Report 2020
Despite organizations adopting ‘secure’ email gateways and extensive employee training, 94% of cyber-attacks still start in the inbox. It’s clear a more advanced approach to email security is needed. Able to spot the subtlest signals of attack, Darktrace Antigena Email recognizes malicious activity even in ‘clean emails’ –...
Download Now -
State of the Internet / Security: Credential Stuffing in the Media Industry (Special Edition)
2020 began with Akamai security researchers gaining greater visibility into the credential stuffing landscape just as the COVID-19 lockdowns began. Some attack trends continued. Many spiked exponentially. 2019’s 208% increase in credential stuffing attacks against video websites, for instance, suddenly paled in comparison to the 1,450% increase we saw in...
Download Now -
This common security gap leaves data and systems exposed Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers...
Download Now -
Ransomware is one of the biggest challenges that organizations face today. This menace started way back in 1988 with the AIDS ransomware. After this initial foray, it kept a low profile until the mid-2000s when organizations were hit by Krotten. Recent years have seen more sophisticated ransomware, such as WannaCry...
Download Now -
Ten Ways to Improve IT Efficiency with an SOE
In today's digital businesses, IT organizations are expected to deliver more services at a faster pace than ever before. However, an IT infrastructure built on multiple operating systems creates complexity that can delay provisioning, increase downtime, and create security and compliance risks. Read more to learn the 10 steps to...
Read More -
Build Secure and Compliant Apps You Can Trust on Heroku
The Fourth Industrial Revolution has welcomed an unexpected era of digital innovation that is transforming every industry, business, and individual experience. Mobile apps have accelerated this revolution and changed how we work and live. Unfortunately, as the number of mobile devices and apps has increased, so does the attack surface...
Download Now -
Simplify your security operations (e-book)
Protecting your organization is a critical — but frequently daunting — task. Automating your security operations center can help you streamline security operations, response, and remediation activities at scale to reduce the risk and cost of breaches. A unified platform like Red Hat® Ansible® Automation Platform can connect your security...
View This Now