Our data security experts from Sophos and Druva will take a practical look at the before, during and after effects from a ransomware attack, including: How the security threat continues to evolve, How to monitor and predict security
Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.
Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?
The cyberthreat landscape continues to grow and evolve. Cybersecurity Ventures predicts that cybersecurity will become a $1 trillion enterprise between 2017 and 2021. What is more frightening is the fact that the cost of cybercrime is
Web app firewalls have the right idea - protect apps in production from attacks, but the execution is all wrong. It bogs down Security Teams with false alarms. We need to rethink how we approach application security. It's more than
As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data by cybercriminals and other malicious