Despite a decline in the number of ransomware attacks over the past two years, there has been a dramatic increase in ransom demands.
Ransomware was once a blip on the cyber security radar, but times have changed: Ransomware attacks grew nearly 500 percent, to 3.8 million attacks, from 2014 to 2015. Ransomware has been [...]
2014 was a banner year for cyberattackers, but not security. The high-profile data breaches of last year prove that antivirus is not enough, and the numbers of spear-phishing and web-based [...]
When is a patch not a patch? When it becomes another exploit on your network. We sometimes lose sight of these obvious points when talking about patching and vulnerability management. At [...]
In the past, IT security was like insurance, viewed as an expense, not a revenue generator. That perception left IT with minimal dollars allocated to securing networks, data, and other assets. [...]
IT administrators have plenty of perimeter security tools at their disposal, from firewalls to spam filters to intrusion detection solutions. But despite all the preventative measures, most [...]
The number of devices that rely on network connectivity to do their jobs is skyrocketing -- mobile-connected devices will outnumber people in the world by the end of the year, according to Cisco. [...]
This post is part of a three-part series on ghost assets. The vast majority of IT environments are haunted. Large-scale infrastructures, by virtue of their operational requirements, value high [...]