Cyber Attacks Resources

Cyber Attacks news and support resources, featuring the hottest solutions, technologies and vendors in the Cyber Attacks world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Cyber Attacks"

Cisco: Securing Your Data in the Transformation to Digital

Cisco
I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Haynes, Cisco product specialist at Global Knowledge Canada, here are my top three […]

Microsoft Video: Protecting Your Information & Data Against Cyber Threats

Microsoft Video: Protecting Your Information & Data Against Cyber Threats

Microsoft
Cyber security technologies and best practices will help consumers, businesses and organizations enable a safer online environment. This video goes deeper into the best practices that can be used to better protect information and data inside and outside of your operational perimeters. Learn more: https://www.microsoft.com/en-us/safety https://blogs.technet.microsoft.com/msrc/ https://www.microsoft.com/en-us/security/default.aspx This video is from the fine folks at […]

Ivanti – Citrix Ready PartnerSpeak Video at Citrix Synergy 2017

Introducing Ericom Shield for Secure Browsing

Ericom Software
Meet Joe CISO, the information security professional responsible for protecting the organization from all cyber threats, including ransomware, drive-by downloads and zero-day exploits. With the complexity and volume of new threats launched daily, Joe knows that conventional web security measures such as antivirus, secure web gateways, and firewalls just aren’t enough. He needs a new […]

Ivanti – Citrix Ready PartnerSpeak Video at Citrix Synergy 2017

Cisco: The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

Cisco
Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing, and eradicating the latest cyber threats. Occasionally, adversaries may leave evidence on compromised devices which may […]

Cisco: Securing Your Data in the Transformation to Digital

VMware: Transforming Security Within Your Business

VMware
In this second of a four-part video series, Richard Munro, global cloud strategy director at VMware, discusses the importance and benefits of taking a Cross-Cloud approach to help all lines of the business drive innovation and deliver on their strategic IT priorities. He also considers the key questions that businesses should be asking when it […]

VMware Video: Top Reasons For Attending VMworld 2017 Europe

How identity addresses the challenges of modern IT evolution

FSLogix
The online world is going through massive changes, are you coping up with it? Read on the article to understand how identity is playing an important role in modern IT evolution. The way organizations are providing services to customers across multiple channels is going through massive change. Mobile adoption, cloud computing, big data services, are […]

Ivanti – Citrix Ready PartnerSpeak Video at Citrix Synergy 2017

This week in cyber threats: A suspicious Google Docs email and Intel’s VPro vulnerability

Ivanti
Ivanti employees were recently alerted by Michael Lloyd, security engineer, that a scam email had surfaced and was spreading quickly. It resembles a very convincing Google Docs invitation, and may even come from someone you know. Here’s a screenshot: Google Docs scam If you click “Open in Docs,” you will be asked to allow more access to your […]

Cisco: Securing Your Data in the Transformation to Digital

HIPAA Violation Damage Control Tips

LUA
HIPAA violations can result in hundreds of thousands of dollars in fines. These violations are often caused by breaches, cyber threats, and human errors that compromise patient protected health information (PHI). Here are some tips for managing HIPAA violations that impact your patients and your organizations. After A HIPAA Violation – Lessons Learned From VUMCHealthcare […]

Ivanti – Citrix Ready PartnerSpeak Video at Citrix Synergy 2017

Citrix: Real Time Cyber Threat Detection and Remediation

Citrix Systems
The cyber threat landscape is changing rapidly. In addition to basic IT/InfoSec blocking and tackling of weak passwords, elevated service account permissions, and the human vector, we now have to deal with ransomware and Mirai-like botnet attacks. System logs were once good enough. The speed at which these threats are occurring has shifted from days […]

Ivanti – Citrix Ready PartnerSpeak Video at Citrix Synergy 2017

Visit our Sponsors!


Close