Companies must embrace a data-centric approach and develop a strategic understanding of what data they have and how valuable it is to their business operations, says CyberTech.
On any given day, Google tracks more than 270 targeted or government-backed attacker groups from more than 50 countries.
Software-defined perimeter is the way to go when adopting a zero-trust strategy, says the Cloud Security Alliance.
The prices for credit card numbers and botnet rentals have plummeted over the past five years, Trend Micro reveals.
The solution integrates backup, disaster recovery, next-generation anti-malware, anti-virus, cyber security and management tools into a single console. [Local rep: Synapsys]
Phishing sites and phishing attacks have exploded since the outbreak of the coronavirus, says Ovations Group.
A recent CyberArk study indicated around one in four enterprises is believed to make use of over 100 third-party vendors.
Endpoint detection and response has become a necessary addition to EPP tools in order to deal with modern cyber security threats.
The report details changing tactics and global demand for new malicious services like deepfake ransomware and AI bots.
Fully automated threat detection and remediation – no playbook required.
Proofpoint's security posture focuses on the people component of the cyber security risk framework.