Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.
View this infographic to discover the security strategies needed to overcome the challenges of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and
As companies become increasingly digital, they are recognizing the importance of sound digital investigations. More time is being spent investigating digital activity for the purposes of regulatory compliance, corporate policy
Our data security experts from Sophos and Druva will take a practical look at the before, during and after effects from a ransomware attack, including: How the security threat continues to evolve, How to monitor and predict security
With the rise in ransomware attacks, bank heists that reached new levels of sophistication, and extortion plots that were beyond anything we could have imagined, 2016 certainly was an eventful year for cybersecurity. Going into 2017,