VPN protocols explained and compared

Credit to Author: Pieter Arntz| Date: Fri, 07 May 2021 11:11:15 +0000

A VPN protocol makes a VPN tick, affecting important factors like speed and security. Here we compare the most widely used protocols.

Categories: Explained

Tags:

(Read more…)

The post VPN protocols explained and compared appeared first on Malwarebytes Labs.

Read more

NFTs explained: daylight robbery on the blockchain

Credit to Author: Malwarebytes Labs| Date: Thu, 18 Mar 2021 16:34:32 +0000

NFTs are a certificate of ownership protected by blockchain technology. So how come they did they get stolen?

Categories: Explained

Tags:

(Read more…)

The post NFTs explained: daylight robbery on the blockchain appeared first on Malwarebytes Labs.

Read more

Deep learning: An explanation and a peek into the future

Credit to Author: Pieter Arntz| Date: Tue, 01 Dec 2020 15:36:57 +0000

Deep learning is a special field in machine learning that is showing new developments in many industries. We explain the concept and give some examples of the latest and greatest.

Categories: Explained

Tags:

(Read more…)

The post Deep learning: An explanation and a peek into the future appeared first on Malwarebytes Labs.

Read more

RegTech explained: a crucial toolset for the financial industry

Credit to Author: Pieter Arntz| Date: Fri, 06 Nov 2020 16:30:00 +0000

The financial industry has come to rely on RegTech. It helps financials comply with regulations and tightens up data safety and security. But what is it exactly?

Categories:

Tags:

(Read more…)

The post RegTech explained: a crucial toolset for the financial industry appeared first on Malwarebytes Labs.

Read more

Introducing VideoBytes, by Malwarebytes Labs

Credit to Author: Malwarebytes Labs| Date: Wed, 30 Sep 2020 15:30:00 +0000

This week, we’re launching VideoBytes, a new video series featuring research from Adam Kujawa, security evangelist and a director for Malwarebytes Labs.

Categories:

Tags:

(Read more…)

The post Introducing VideoBytes, by Malwarebytes Labs appeared first on Malwarebytes Labs.

Read more

The best test for an EDR solution is one that works for you

Credit to Author: Akshay Bhargava| Date: Thu, 28 May 2020 15:15:00 +0000

Since its inception, the endpoint detection and response (EDR) market has evolved rapidly with new innovations to better address the cyber landscape and meet customers’ needs for an effective and simple solution that just works. But finding something that just works means something quite different for every business, depending on their size, security expertise, and requirements.

Categories:

Tags:

(Read more…)

The post The best test for an EDR solution is one that works for you appeared first on Malwarebytes Labs.

Read more

Explained: cloud-delivered security

Credit to Author: Pieter Arntz| Date: Tue, 05 May 2020 15:15:00 +0000

What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might.

Categories:

Tags:

(Read more…)

The post Explained: cloud-delivered security appeared first on Malwarebytes Labs.

Read more

Harnessing the power of identity management (IDaaS) in the cloud

Credit to Author: Malwarebytes Labs| Date: Tue, 18 Feb 2020 17:25:42 +0000

With security, compliance, and customer engagement driving organizations to the cloud, it’s no wonder IDaaS has become the standard in identity management. Learn about the benefits and concerns of IDaaS for organizations of all sizes.

Categories:

Tags:

(Read more…)

The post Harnessing the power of identity management (IDaaS) in the cloud appeared first on Malwarebytes Labs.

Read more