Looking at the financial cyberthreats of 2017 through a business lens
Credit to Author: Nikolay Pankov| Date: Wed, 28 Feb 2018 10:00:05 +0000
Our experts analyzed last year’s financial cyberthreats, and here is their report
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Nikolay Pankov| Date: Wed, 28 Feb 2018 10:00:05 +0000
Our experts analyzed last year’s financial cyberthreats, and here is their report
Read MoreCredit to Author: Michael Miley| Date: Mon, 26 Feb 2018 14:00:01 +0000
The Internet is a wonderful thing. But we all know there are also risks lurking around every corner. We want to protect ourselves from malware and identity theft, prevent third-party trackers and advertisers slurping our private information, and keep our kids safe when browsing. One way to do this is to use a virtual private…
Credit to Author: Kaspersky Team| Date: Wed, 21 Feb 2018 14:30:20 +0000
One of our GReAT experts will share information on the techniques and operations implemented by cybercriminals in 2017 and how to counter them in 2018
Read MoreCredit to Author: Paul Kincaid| Date: Wed, 21 Feb 2018 09:00:00 +0000
![]() | |
| With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here’s part one of our guidelines. Categories: Tags: breach notificationbreach remediationbreach responseData Subject RightsgdprGeneral Data Protection RegulationIncident Responseincident response program |
The post How to build an incident response program: GDPR guidelines appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Tue, 20 Feb 2018 17:05:26 +0000
One of the key use cases for our customers is the protection of their data center environments, which can involve moving off the perimeter into the data center or segmenting their data center from the rest of the organization. It is imperative that a data center security solution not only deliver high inspection throughput and…
Credit to Author: John Snow| Date: Tue, 20 Feb 2018 15:42:18 +0000
Kaspersky Lab publishes an update on Russian-speaking Sofacy APT activity in 2017
Read MoreCredit to Author: Trend Micro| Date: Tue, 20 Feb 2018 13:30:05 +0000
There are few more exciting frontiers of the Internet of Things (IoT) than connected cars. Gartner predicts that there will be 61 million vehicles with built-in connectivity on our roads by 2020. But as we drive ever closer to a future where autonomous vehicles are a commonplace sight, we must be alert to the implications…
Credit to Author: Nikolay Pankov| Date: Fri, 16 Feb 2018 15:20:15 +0000
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
Read More