Cyber Attacks Resources

Cyber Attacks news and support resources, featuring the hottest solutions, technologies and vendors in the Cyber Attacks world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Cyber Attacks"

Understanding Remote Desktop Protocol Threats (vlog)

Devolutions
0
The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attacks can happen at any time. While there are probably many factors that led to the attack, it’s worth focusing on […]

Understanding Remote Desktop Protocol Threats

Devolutions
0
The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attacks can happen at any time. While there are probably many factors that led to the attack, it’s worth focusing on […]

Is It Time to Rethink Privileged Access Management?

Devolutions
0
Privileged Access Management (PAM) helps organizations achieve two key objectives: restricting access to privileged accounts and maintaining compliance. PAM is especially vital these days because, in many organizations, the number of user accounts with administrative access to critical systems is greater than the total number of employees. What’s more, 8 out of 10 breaches are […]

IGEL Raises the Security Bar Again with UEFI Secure Boot

IGEL Technology
0
IGEL’s customers know we deliver on our ‘simple, smart and secure’ approach to endpoint computing.  Behind this approach is our continual search for ways to bring even greater security to our customers around the globe facing the ever present cyber threats. Our latest achievement is a big one: IGEL is the first thin client manufacturer […]

The Future? It’s Weaponized Malware

Ivanti
0
Without question, hackers today can have a major impact on critical infrastructure worldwide—hospitals, banking systems, the power grid—especially when they’re partnered with aging, vulnerable technology like legacy software. And they appear to be more and more intent on making that happen.   That’s a nightmarish scenario. But cyber attacks are growing in sophistication, and evolving in intent—in no […]

Microsoft: Introducing Azure Advanced Threat Protection

Microsoft
0
The nature and requirements of security have changed as the frequency and severity of cyber attacks have grown dramatically. With the increase in sophistication and velocity of these attacks, current IT security tools provide limited protection when user credentials, either on-premises or in the cloud, are compromised. And when there is an incident, responding to […]

Protect your network and apps from cyber threats

Citrix Systems
0
Discover how a Web Application Firewall (WAF) can protect your applications and infrastructure. This video is from the fine folks at Citrix

Align to SANS Maturity Model, reduce attack surface with virtualization

Bromium
0
Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and micro-virtualization of endpoints proactively minimizes the attack surface to dramatically reduce breaches and false alerts. You’ve heard the saying, “the best […]

Build a Last Line of Defense Against Cyber Attacks

Dell
0
Channel partners looking for new revenue sources should consider qualifying to sell the Dell EMC Isolated Recovery solution. It’s the last line of data protection defense for your customers against cyber attacks that could deal their businesses a devastating blow if an attack corrupted or compromised their mission-critical or system-of-record data. Since cyber attacks are […]

Patching Missteps Are Not an Excuse to Blame Victims of Ransomware Attacks

Dell
0
“It’s their own fault. They wouldn’t have been hit if they’d kept up with their patches and updates.” How many times did we hear this line in the wake of WannaCry, Petya and virtually every other cyber attack that has exploited known vulnerabilities in recent years? To hear the Monday-morning quarterbacks talk, you’d think data […]

Transforming Security Requires the Right Security Culture

Dell
0
4,000 ransomware attacks per day, almost five times as many attacks on the Internet of Things within only 12 months, and twice the number of DDoS attacks during the same time period: These figures are a testament to the insatiable criminal energy of the hacker community, and are certainly alarming. In the context of increasing […]

How to Prevent Cyber Attacks – A On-Demand Webinar on Enterprise Cyber Security

ManageEngine
0
Watch the following video detailing how to prevent cyber attacks.  This is a webinar on enterprise cyber security. This video is from the fine folks at ManageEngine

Cisco: Prevention or Cure? Focusing your Cybersecurity Efforts and Investments

Cisco
0
An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organization against the imminent threat of a cyber attack, it’s essential to factor in both. Here’s why. Today’s hackers are motivated and more organized than ever. This past year has shown how vulnerable organizations of […]

NVIDIA and Booz Allen Hamilton Partner to Speed Up Cyber Threat Detection

NVIDIA
0
Hear how NVIDIA and Booz Allen Hamilton are partnering together to speed up detection of cybersecurity threats and train thousands of developers in deep learning from Peter Guerra, VP and Chief Data Scientist at Booz Allen. http://nvda.ws/2lFIjtA This video is via NVIDIA.

Visit Our Sponsors

Close