Editorial Staff Blogs
AI: Utopia or dystopia?
Today AI is being used to find vulnerabilities in software and systems before the attackers do so, enabling defenders to be proactive in finding zero days and potential Patient 0 victims...
Snakebit at the GRC Corral
This eBook looks at how managing the three legs of the GRC stool will keep a company from violating regulations while reducing risk and improving security.
Cloud-based Backup: Surviving Ransomware
This SC Media eBook provides practical advice on protecting your network from the next WannaCry-like attack.
Keep your network under control
Read the whitepaper to find out why network visibility is critically important, why most next-gen firewalls are unable to provide the necessary visibility, and what you can do to easily...