Editorial Staff Blogs
Verdict: This is an excellent approach to first phase interdiction for ransomware attacks and shows a solid understanding of the ransomware process and how to manage its delivery through phishing.
Verdict: This is a solid anti-ransomware tool, priced right and well-supported. It certainly deserves your attention. We make this our Recommended product for multi-featured products this month.
Verdict: This is absolutely a world-class anti-ransomware product in a world-class ecosystem. Using the associated products, you can build out a solid security framework in your enterprise. For its completeness and solid competence, we make this our Best Buy this month.
Verdict: A promising product not quite ready for prime time.
Best Practices for Dealing with Phishing and Next-Generation Malware
Phishing and malware threats are skyrocketing as cybercriminals become more adept and stealthier in penetrating IT security defenses. Read this white paper to learn how users can...
Security Information and Event Management (SIEM) Orchestration
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Whaling: Anatomy of an Attack
Email impersonation attacks are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years. Download this...
2016 DDoS Attack Trends
DDoS will likely be a problem that is here to stay, but understanding the latest trends can help you be better prepared. This paper explores the growing stateful attacks, and why...