Confrontation of black and white knights on the chessboard.

Making Sense of Needs vs. Cyber Vendor Claims: Analyst Meets Expert

With malware ransoms now rising to as high as $1M (USD), there is heightened urgency for organizations and their CISOs, CSOs and other leaders to understand the latest threats to their business’ success, and their options to address them. The Threat Intelligence market…

Endpoint Protection

Best 10 Features of an Effective Endpoint Security Strategy

With overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures multiple folds. Setting up stringent endpoint security measures would be the best way to encounter possible malicious risks. Endpoint Security…

Fathers Day

Try Something Unique This Father’s Day

Why should fathers day be about you alone? It could well be about your children, right? After all, they are your flesh and blood and the reason you are working hard. So let’s be different this Father’s day and turn…

Google Proposes: Managed CAs to Issue Symantec Certificates

Google Proposes: Managed CAs to Issue Symantec Certificates

On May 19, 2017, in the Blink Process forum, Ryan Sleevi of the Google Chrome team wrote:”Chrome will require that by 2017-08-08 all new Symantec-chaining certificates be issued by independently operated third-parties (aka “Managed CAs”). Chrome will implement a check,…

Wannacry ransomware

Ransomware Defense: How to avoid falling victim to the next “WannaCry” [Webinar]

Join NATO Cyber Centre Ambassador Kenneth Geers and Comodo cybersecurity expert Gregory Lewis on June 7 for a free webinar to learn how you can protect yourself against ransomware. Register here: https://www.comodo.com/landing/wannacry-ransomware-endpoints-protection/?af=9030 By now, you’ve surely heard of WannaCry. The…

Online Security

Memorial Day 2017 – State of Online Security

Memorial Day holiday starts the beginning of a busy vacation season in the United States. As people get ready for vacation, the National Cyber Security Alliance in Washington warns about cyber security threats and issued tips on to how to…

endpoint security

Your IoT Devices May Be Potential Targets to Malware That Wipe Out Data

Certain malware attacks have been discovered that target IoT (Internet of Things) devices and cause the wiping out of data from the systems or devices that are infected. This discovery has been made based on certain attacks that happened recently.…

Wannacry Ransomware Attacks

Wannacry Copycats Expected to Increase BUT There Are Solutions

Here we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred, on a global scale. This time, the ransomware attack requested payments of $300 in Bitcoin currency – per computer –…

Endpoint Security

How to Stay Protected from WannaCry Ransomware

What is WannaCry 2.0 Ransomware? WannaCry malware also referred to as WannaCrypt, WanaCrypt0r 2.0 or Wanna Decryptor, is a virus that combines a ransomware and a worm. The WannaCry attack is considered to be the most widespread cyber attack in…

Wannacry

The WannaCry Ransomware Attack: Combating Ransomware is Possible

WannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is hot news. WannaCry, which hit organizational networks in 150 countries on 12 May, 2017, targets systems/networks functioning on Microsoft Windows…

Page 1 of 5912345...102030...Last »