For enterprise protection, antivirus software is no longer enough

Antivirus software to protect corporate systems from malware is like a flu shot. You should have…

The ransomware epidemic: How to prep for a shakedown

'Know your enemy' – understanding what to prepare forImage by ReutersWhile ransomware isn't new, this once-simple…

Profiling 10 types of hackers

Different shapes and sizesImage by ThinkstockHackers, like the attacks they perpetrate, come in many forms, with…

7 tips to strengthen online security

Seeing the lightImage by PexelsA lightbulb. We can connect a lightbulb in our house to the…

Top 5 email security best practices to prevent malware distribution

A trusted channelImage by ThinkstockEmail is a critical enterprise communication tool synonymous with sending important documents…

10 things to worry about when your vendor divests

Potentially difficult timesImage by ThinkstockIn tech, divestitures are a fact of life and solutions are bought…

Fragmentation: the silent killer in security management

Closing the gapImage by James HoToday’s detection deficit between attackers and defenders is near an all-time high – and the…

7 universal rules of threat intelligence

ThreateningImage by ThinkstockCybersecurity is a heroic task. Every day, businesses and organizations face an onslaught of…