Sophistication in Hackers

2018 Emerging Threats Show New Sophistication in Hackers

One of the problems with threat prevention is that we get too hung up on yesterday’s threats. Security systems are designed for the types of attacks we’ve seen in the past. That’s ...
Security Boulevard
56% of Orgs Hit with Ransomware Attack in the Past Year, Finds New Survey

56% of Orgs Hit with Ransomware Attack in the Past Year, Finds New Survey

Ransomware is still rampant across organizations worldwide, with roughly 56 percent of businesses experiencing a ransomware attack in the last 12 months, new research revealed. The findings come from SentinelOne’s 2018 Global ...

IDC’s Frank Dickson to Discuss Innovative Approaches to Cybersecurity [Webinar]

Frank Dickson, IDC Research Director, Security Products, authored the IDC Perspective, “Validating the Known: A Different Approach to Cybersecurity” Join this live webinar on February 22 to hear Frank present his research ...
Hidden Costs of Cybersecurity Detection Really Add Up

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with ...
Bromium Helps You Defeat Ransomware

Get the Report: CISO Recommendations for Endpoint Security by Security Current

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the ...
The CISO's Dilemma: Cybersecurity vs Productivity

Cybersecurity vs Productivity: The CISO’s Dilemma

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee ...
How to develop a Statement of Applicability in ISO 27001:2013

How to develop a Statement of Applicability in ISO 27001:2013

The Statement of Applicability (SoA) is one of the key documents that you will need to produce for your ISO 27001 information security management system (ISMS). What is the Statement of Applicability? ...
Talking the Threat Intelligence Mind Map and How It Can Help Organizations by SurfWatch Labs

How a Mind Map Can Help Organizations Better Understand Threat Intelligence

Over the past few years, cyber threat intelligence has matured to cover many different aspects of business. What threat intelligence is and how people view and define it can vary quite a ...
3 reports needed for an ISO 27001 audit

3 reports needed for an ISO 27001 audit

An ISO 27001 audit can be intimidating, especially if it is the first time that your information security management system (ISMS) has been audited. Producing accurate, concise and updated reports is an ...
Loading...