<
>

Posts in Taxonomies

The Invisible Thread Between Dolphins and Digital Personal Assistants

Author: Morey Haber, CTO, BeyondTrust What do dolphins and digital personal assistants like Amazon Echo, Google Assistant, and Apple’s HomePod have in common? They all can hear and respond...

The Third Question(s) Today’s CEOs Should Ask (& Know the Answers To)

Author: Rick McElroy, Security Strategist, Carbon Black In my previous blogs, we discussed the importance of risk management and highlighted a list of questions CEOs should know the...
Taxonomy: Cyber Safety

Cisco to continue to progress in transforming towards more software and subscriptions

Cisco today reported third quarter results for the period ended April 28, 2018. Cisco reported third quarter revenue of $12.5 billion, net income on a generally accepted accounting principles (GAAP)...
Taxonomy: Cyber Safety

Roaming Mantis extends DNS hijacking attacks from Asia to rest of world, adds crypto-mining

On 16 April, Kaspersky Lab researchers reported on a new Android malware distributed through a domain name system (DNS) hijacking technique and targeting mainly smartphones in Asia. Four weeks on,...

McAfee Named a 2018 Gartner Peer Insights Customers’ Choice for Cloud Access Security Brokers

McAfee, the device-to-cloud cybersecurity company, today announced it was named a 2018 Gartner Peer Insights Customers’ Choice for Cloud Access Security Brokers. Gartner defines the cloud...
Taxonomy: Cyber Safety

Sophos announced financial results for the year-ended 31 March 2018

Sophos Group plc, a leading provider of cloud-enabled enduser and network cybersecurity solutions, today issues its audited results for the year-ended 31 March 2018...

Fortinet Threat Landscape Report Reveals an Evolution of Malware to Exploit Cryptocurrencies

Fortinet today announced the findings of its latest Global Threat Landscape Report. The research reveals cybercriminals are evolving their attack methods to increase their success rates and to...
Taxonomy: Cryptocurrency

Businesses Stuck in a DDoS-Daze as Ineffective Strategies Leave Them Vulnerable to Attack

Research from Kaspersky Lab has revealed that businesses are falling behind in the race to protect themselves from Distributed Denial of Service (DDoS) attacks, due a reliance on others to do the job...

USO Uses Cylance’s AI Powered Endpoint Solution To Protect Donors, Along with Service Members and Their Families from Information Theft

Cylance® Inc., is pleased to highlight the proactive efforts of the United Service Organizations, Inc. (USO) in preventing the theft of sensitive data of their donors, service members, and...

Trend Micro Expertise Results in Conviction from Scan4You Trial

Trend Micro Incorporated, a global leader in cybersecurity solutions, today announced details of its close cooperation with the FBI to identify, arrest and bring to trial the individuals linked to...

Pages