Cyber Attacks Resources

Cyber Attacks news and support resources, featuring the hottest solutions, technologies and vendors in the Cyber Attacks world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Cyber Attacks"

Securing your enterprise from cyber attacks – Webinar Series Part 2

ManageEngine’s two-part webinar series deals with tools and techniques that help secure your organization against cyber threats. This video is from the fine folks at ManageEngine

Securing your enterprise from cyber attacks – Webinar Series Part 1

ManageEngine’s two-part webinar series deals with tools and techniques that help secure your organization against cyber threats. This video is from the fine folks at ManageEngine

Citrix Announces NetScaler Secure Web Gateway Solution in NetScaler 12.0

Citrix Systems
Enterprises today face an increasing number of attacks through user’s Internet web sessions. It could be because users are visiting compromised or malicious websites that can lead to stolen identities, malware or botnet installation, data theft and exfiltration or even ransomware infections. In addition, today over half of the web is encrypted. Does that make […]

VMware: Sending a Bright Signal with VMware’s Shawn Bass and Tom Corn

Tom Corn, VMware SVP Security Products, and Shawn Bass, VMware VP End-User Computing, discuss how virtualization is transforming security and giving organizations more visibility into their applications, allowing them to see bright signals for potential cyber attacks. These bright signals, along with an organization’s ability to leverage virtualization, are opening up new opportunities for detecting […]

VMware: Getting up to speed with Micro-Segmentation

High-profile cyber attacks are frequently in the news these days, putting IT security at the forefront of everyone’s minds. The WannaCry and Petya ransomware assaults, in particular, hit major businesses across the world in nations as diverse as the US, Russia, India, Taiwan and Britain. The WannaCry extortion attack alone impacted more than 300,000 PCs […]

Mitigating Security Threats

In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your network. Now that we’ve got the basics out of the way, it’s time to get into the tough stuff: mitigating security threats. After all, it’s 2017 and cyber threats are rampant. You need to be in a position […]

XData and SambaCry add to the whopping number of data breaches this year

Weeks after WannaCry appeared center stage, networks around the world are still being bombarded with clusters of cyber threats including Adlykuzz and EternalRocks. But is that all? Nope. Two more threats, XData and SamabaCry are already doubling the number of existing threats. Since WannaCry, almost half of all data breaches have affected the business sector, […]

If you think WannaCry is Huge, wait for EternalRocks!

While the world was responding to the WannaCry attack—which only utilized the EternalBlue exploit and the DoublePulsar backdoor—researchers discovered another piece of malware, EternalRocks, which actually exploits seven different Windows vulnerabilities Miroslav Stamper, a security researcher at the Croatian Government CERT, first discovered EternalRocks. This new malware is far more dangerous than WannaCry. Unlike WannaCry, […]

Secure you network from Petya & Skype using Desktop Central

This workshop will help you to explore the ways to secure your computers from ransomware and cyber attacks. This video is from the fine folks at ManageEngine

Forrester: Victim Blaming Won’t Stop Global Ransomware Attacks

Forrester Research
The security industry has an accountability crisis. It’s time to talk about it, then fix it. Whenever a massive cyber attack occurs inevitably a chorus of voices rises to blame the victims.  WannaCry on 5/12 and Petya on 6/27 yet again kicked off the familiar refrains of: “If users didn’t click on stuff they shouldn’t….” […]

Microsoft Announces end-to-end security features in Windows 10

Part 1: Next generation security coming to Windows 10 Fall Creators Update The Microsoft mindset is a security mindset. Our goal is to ensure customer safety as the security threat landscape continues to grow increasingly more sophisticated and adversaries are more successful at impacting the bottom line. New security features in the Windows 10 Fall […]

Cisco: Securing Your Data in the Transformation to Digital

I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Haynes, Cisco product specialist at Global Knowledge Canada, here are my top three […]

Microsoft Video: Protecting Your Information & Data Against Cyber Threats

Cyber security technologies and best practices will help consumers, businesses and organizations enable a safer online environment. This video goes deeper into the best practices that can be used to better protect information and data inside and outside of your operational perimeters. Learn more: This video is from the fine folks at […]

Introducing Ericom Shield for Secure Browsing

Ericom Software
Meet Joe CISO, the information security professional responsible for protecting the organization from all cyber threats, including ransomware, drive-by downloads and zero-day exploits. With the complexity and volume of new threats launched daily, Joe knows that conventional web security measures such as antivirus, secure web gateways, and firewalls just aren’t enough. He needs a new […]

Visit our Sponsors!