Cyber Attacks Resources

Cyber Attacks news and support resources, featuring the hottest solutions, technologies and vendors in the Cyber Attacks world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Cyber Attacks"

VMware: Sending a Bright Signal with VMware’s Shawn Bass and Tom Corn

VMware
Tom Corn, VMware SVP Security Products, and Shawn Bass, VMware VP End-User Computing, discuss how virtualization is transforming security and giving organizations more visibility into their applications, allowing them to see bright signals for potential cyber attacks. These bright signals, along with an organization’s ability to leverage virtualization, are opening up new opportunities for detecting […]

VMware: Getting up to speed with Micro-Segmentation

VMware
High-profile cyber attacks are frequently in the news these days, putting IT security at the forefront of everyone’s minds. The WannaCry and Petya ransomware assaults, in particular, hit major businesses across the world in nations as diverse as the US, Russia, India, Taiwan and Britain. The WannaCry extortion attack alone impacted more than 300,000 PCs […]

Mitigating Security Threats

ManageEngine
In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your network. Now that we’ve got the basics out of the way, it’s time to get into the tough stuff: mitigating security threats. After all, it’s 2017 and cyber threats are rampant. You need to be in a position […]

XData and SambaCry add to the whopping number of data breaches this year

ManageEngine
Weeks after WannaCry appeared center stage, networks around the world are still being bombarded with clusters of cyber threats including Adlykuzz and EternalRocks. But is that all? Nope. Two more threats, XData and SamabaCry are already doubling the number of existing threats. Since WannaCry, almost half of all data breaches have affected the business sector, […]

If you think WannaCry is Huge, wait for EternalRocks!

ManageEngine
While the world was responding to the WannaCry attack—which only utilized the EternalBlue exploit and the DoublePulsar backdoor—researchers discovered another piece of malware, EternalRocks, which actually exploits seven different Windows vulnerabilities Miroslav Stamper, a security researcher at the Croatian Government CERT, first discovered EternalRocks. This new malware is far more dangerous than WannaCry. Unlike WannaCry, […]

Secure you network from Petya & Skype using Desktop Central

ManageEngine
This workshop will help you to explore the ways to secure your computers from ransomware and cyber attacks. This video is from the fine folks at ManageEngine

Forrester: Victim Blaming Won’t Stop Global Ransomware Attacks

Forrester Research
The security industry has an accountability crisis. It’s time to talk about it, then fix it. Whenever a massive cyber attack occurs inevitably a chorus of voices rises to blame the victims.  WannaCry on 5/12 and Petya on 6/27 yet again kicked off the familiar refrains of: “If users didn’t click on stuff they shouldn’t….” […]

Microsoft Announces end-to-end security features in Windows 10

Microsoft
Part 1: Next generation security coming to Windows 10 Fall Creators Update The Microsoft mindset is a security mindset. Our goal is to ensure customer safety as the security threat landscape continues to grow increasingly more sophisticated and adversaries are more successful at impacting the bottom line. New security features in the Windows 10 Fall […]

Cisco: Securing Your Data in the Transformation to Digital

Cisco
I recently had the opportunity to participate in a joint webinar between Cisco and Global Knowledge Canada to discuss Cisco’s latest cybersecurity industry research, the security challenges organizations face today, and how organizations can mitigate risks. After a detailed conversation with Brad Haynes, Cisco product specialist at Global Knowledge Canada, here are my top three […]

Introducing Ericom Shield for Secure Browsing

Ericom Software
Meet Joe CISO, the information security professional responsible for protecting the organization from all cyber threats, including ransomware, drive-by downloads and zero-day exploits. With the complexity and volume of new threats launched daily, Joe knows that conventional web security measures such as antivirus, secure web gateways, and firewalls just aren’t enough. He needs a new […]

Cisco: The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

Cisco
Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing, and eradicating the latest cyber threats. Occasionally, adversaries may leave evidence on compromised devices which may […]

WannaCry Ransomware Exploding Across the Globe

Ivanti
UPDATE: Microsoft releases version of MS17-010 SMBv1 on earlier platforms like XP and 2003. Also recommends deploy update ASAP! As many of you know, there is a ransomware attack exploding across the globe. The last headline I read estimated that 90 countries were impacted. This could be one of the biggest cybersecurity incidents we have seen […]

VMware: Transforming Security Within Your Business

VMware
In this second of a four-part video series, Richard Munro, global cloud strategy director at VMware, discusses the importance and benefits of taking a Cross-Cloud approach to help all lines of the business drive innovation and deliver on their strategic IT priorities. He also considers the key questions that businesses should be asking when it […]

How identity addresses the challenges of modern IT evolution

FSLogix
The online world is going through massive changes, are you coping up with it? Read on the article to understand how identity is playing an important role in modern IT evolution. The way organizations are providing services to customers across multiple channels is going through massive change. Mobile adoption, cloud computing, big data services, are […]

Visit Our Sponsors

Close