Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.
Our data security experts from Sophos and Druva will take a practical look at the before, during and after effects from a ransomware attack, including: How the security threat continues to evolve, How to monitor and predict security
With the rise in ransomware attacks, bank heists that reached new levels of sophistication, and extortion plots that were beyond anything we could have imagined, 2016 certainly was an eventful year for cybersecurity. Going into 2017,
Web app firewalls have the right idea - protect apps in production from attacks, but the execution is all wrong. It bogs down Security Teams with false alarms. We need to rethink how we approach application security. It's more than
The transition to a digital economy is requiring networks to evolve rapidly. Applications, data, and services need to flow faster, and in growing volumes, across an increasingly diverse landscape of users, domains, and devices.