The era of the mega breach is upon us. And it's had a seismic effect on global businesses. Many name-brand organisations are spending millions dealing with the aftermath of losing customer data or intellectual property, and others are working as hard as they can to avoid the type of media attention that no one wants.
No organisation is immune to a ransomware attack. In recent months, nearly half of all malware blocked by Mimecast for its 20,000 customers has been ransomware.
ON DEMAND WEBCASTS
Security operations is all about understanding and acting upon of large amounts of data.
We all know that in business today the old perimeter is gone. So too are the days of dealing strictly with your own employees, all housed under one roof.
Regulations and policies to manage the security risk of personal devices are all well and good, but the underlying technology of BYOD also needs to be considered. How effective can BYOD security be?
Email threats are evolving, dangerous and real. A whopping 91% Of cyberattacks start with an wmail*. But hey, 9% don't, right?
For five months, Check Point mobile threat researchers had unprecedented access to the inner-workings of Yingmob, a group of Chinese cyber criminals behind the HummingBad malware campaign
Sign up to our newsletters
SC Magazine UK Articles
- It's a trap! WhatsApp Gold 'premium' version lures users to malware
- SC Awards Europe 2016 winners announcements!
- Microsoft ends common password use and password lockout
- ISIS radicalises 'lone wolves' through strong social media presence
- 1.5 billion Windows computers potentially affected by unpatched 0-day exploit