News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

The Threatpost team breaks down the top privacy-related data incidents of the week – including data leaks from HCL and a golfing app – and highlights some surprisingly good privacy news. Continue reading News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

High-quality cybersecurity posture is typically regarded as the exclusive domain of the large and heavy resourced enterprises – those who can afford a multi-product security stack and a skilled security team to operate it.

This implies a grave risk to… Continue reading WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization

Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

Doing business in today’s connected world means dealing with a continually evolving threat landscape.

With potential losses due to downtime following a breach, plus valuable client and proprietary information at risk, most organizations realize they c… Continue reading Advanced Breach Protection Demystified – Untold Truths On Security Beyond AV

The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

For those of us in the security industry, the annual Cyberthreat Defense Report is a gold mine of insights into the minds of IT security professionals, including what threats keep them up at night, and how they plan to defend against them. The 6th edit… Continue reading The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic]

Webinar: Social Media Platforms and the Cybercrime Economy

New “Social Media Platforms and the Cybercrime Economy” report explores the role of social media in enabling cybercrime The author of the report, Dr. Mike McGuire, will discuss the key findings and recommendations in a live webinar on Wedne… Continue reading Webinar: Social Media Platforms and the Cybercrime Economy

Learn How XDR Can Take Breach Protection Beyond Endpoint Security

How do you know whether an attacker has infiltrated your network? Can you really rely on an Endpoint Detection and Response (EDR) solution to be your go-to technology for identifying security breaches?

Endpoint detection and response (EDR) platform ha… Continue reading Learn How XDR Can Take Breach Protection Beyond Endpoint Security

How to Secure Your Mid-Size Organization From the Next Cyber Attack

If you are responsible for the cybersecurity of a medium-sized company, you may assume your organization is too small to be targeted. Well, think again.

While the major headlines tend to focus on large enterprises getting breached – such as Sony, Equi… Continue reading How to Secure Your Mid-Size Organization From the Next Cyber Attack

How Virtualization Protects Your High-Value Assets [Webinar]

Networks and devices will keep getting compromised. You need a strategy to protect your most critical applications and assets. Bromium Protected App protects your high-value assets (HVAs) against compromised devices On October 23, 2018, analysts f… Continue reading How Virtualization Protects Your High-Value Assets [Webinar]