Security

Evaluating Endpoint Security Products: 15 Dumb Mistakes to Avoid

If you find yourself selecting security products, here are some of the common pitfalls many buyers make when evaluating them

READ MORE

Uncovering Apple’s Mysterious Malware Removal (MRT) Tool Update

Apple’s little known malware removal tool gets a signature update. But what is this new malware family MACOS.35846e4? Find out on this journey inside MRT

READ MORE

Matrix Ransomware Changes The Rules Again | How Much Are You Worth?

Matrix Ransomware is now targeting the enterprise and trying to bypass security software. See what happened when we took it for a spin

READ MORE

What Are Advanced Targeted Attacks? Can You Defend Against Them?

What’s the difference between an ATA and an Opportunistic Attack? Do you know your ATA from your APT? Learn about the latest risks to enterprise here

READ MORE

How Secure Is Open Source Software?

Who is responsible for the security of your open source software dependencies, and what are the risks? Find out the surprising answer here

READ MORE

5 Common Cyber Security Threats That Bypass Legacy AV

Is it time to replace your legacy endpoint protection? Find out by seeing if your AV can handle these five common threats.

READ MORE

5 Ways a CISO Can Tackle the CyberSecurity Skills Shortage Now

The number of organizations reporting a cybersecurity skills shortage has risen every year. What practical steps can you take now?

READ MORE

How Can Ransomware Files Be Unlocked?

Ransomware is not going anywhere and continues to encrypt files. Learn what you can do if all your files are locked by malware

READ MORE

Mac Malware OSX.Dok is Back, Actively Infecting Victims

Man-in-the-middle macOS malware is back infecting unsuspecting users. Learn how it works and how we discovered new infections.

READ MORE