How do I select a CDR soluton for my business?

In the process of file sharing, what is essential for every organization is to make sure malware doesn’t tag along, and this is where a content disarm and reconstruction (CDR) solution comes in handy. Of course, organizations must make sure the s… Continue reading How do I select a CDR soluton for my business?

Cloudera to go private as KKR & CD&R grab it for $5.3B

Cloudera was once one of the hottest Hadoop startups, but over time the shine has come off that market, and today it went private as KKR and Clayton, Dubilier & Rice, a pair of private equity firms announced they intended to purchase Cloudera for $5.3 billion. The company has a market cap of around $3.7 […] Continue reading Cloudera to go private as KKR & CD&R grab it for $5.3B

No White Flags—the Value of Cyber Innovation at Speed and Scale

The first ‘till-less’ Amazon Fresh store opened in London recently. Download a QR code, shop and leave with everything being charged directly to your Amazon account. Is this something that we have all been dying to do? Perhaps not today, but what … Continue reading No White Flags—the Value of Cyber Innovation at Speed and Scale

Building resilience for Government and Defence organisations in 2021

The past 12 months have been a challenging year for security professionals everywhere. But in particular for government and defence organisations battling the growing intensity and sophistication of cyber threats in a year heavily influenced by th… Continue reading Building resilience for Government and Defence organisations in 2021

Mitigating Threats Associated with Downloading Files in Native File Format

File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as cloud transformation. Conside… Continue reading Mitigating Threats Associated with Downloading Files in Native File Format

Mitigating Threats Associated with Downloading Files in Native File Format

File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as cloud transformation. Conside… Continue reading Mitigating Threats Associated with Downloading Files in Native File Format

Key Findings from the 2020 Cyberthreat Defense Report

The new 2020 Cyberthreat Defense Report (CDR) released this week. Now in its seventh year, the annual report provides a look at how global cybersecurity professionals perceive threats and plan to defend against them. The CDR enables cybersecurity profe… Continue reading Key Findings from the 2020 Cyberthreat Defense Report

The Journey of Securing a Long-Tail Supply Chain

Supply chains often are long and complex, and as organizations rely more and more on data to drive their businesses, digital supply chains continue to grow. And as the supply chains continue to grow, so do expectations and risks. To increase profits, … Continue reading The Journey of Securing a Long-Tail Supply Chain

Persistent Telco Data Theft: Is China to Blame?

At least ten cell providers compromised, losing data for “hundreds of millions” of customers. Researchers who found the hacks call it Soft Cell.
The post Persistent Telco Data Theft: Is China to Blame? appeared first on Security Boulevard.
Continue reading Persistent Telco Data Theft: Is China to Blame?

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up at night, and how they plan to defend against them. The 6th edit… Continue reading The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]