Editorial Staff Blogs
Verdict: This is an excellent approach to first phase interdiction for ransomware attacks and shows a solid understanding of the ransomware process and how to manage its delivery through phishing.
Verdict: This is a solid anti-ransomware tool, priced right and well-supported. It certainly deserves your attention. We make this our Recommended product for multi-featured products this month.
Verdict: This is absolutely a world-class anti-ransomware product in a world-class ecosystem. Using the associated products, you can build out a solid security framework in your enterprise. For its completeness and solid competence, we make this our Best Buy this month.
Verdict: A promising product not quite ready for prime time.
Overcoming the SSL/TSL Security Abyss
CISOs are turning to encryption for security, but the myriad of tools makes the process complex. Read about the tools CISOs use to address challenges of SSL/TLS network traffic, their...
Whaling: Anatomy of an Attack
Email impersonation attacks are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years. Download this...
Network Based Security Playbook Guide
You've seen the headlines: cyber breaches at major corporations jeopardizing confidential information for millions of users; highly targeted spear phishing campaigns delivering malware...
Best Practices for Dealing with Phishing and Next-Generation Malware
Phishing and malware threats are skyrocketing as cybercriminals become more adept and stealthier in penetrating IT security defenses. Read this white paper to learn how users can...