by Brian McCarthy | May 6, 2019 | Cybersecurity, Endpoint Security, malware, Ransomware
Targets have included hospitals and municipalities, but the FBI says anyone on the internet should expect to be attacked by cybercriminals. The cities of Newark, Atlanta, and Sarasota have been hit. So have Cleveland’s airport and San Francisco’s transit...by Brian McCarthy | Apr 30, 2019 | Artificial Intelligence, Cybersecurity, Endpoint Security, Premium content, Webinars
About this webinar On-demand, 45 mins. Universities are tempting targets for cybercriminals. They host extensive IT infrastructure, perform cutting edge research, and deal with large sums of money. Nation-state threat actors are drawn to the valuable intellectual...by Brian McCarthy | Apr 29, 2019 | Artificial Intelligence, Cybersecurity, Data Breach, Endpoint Security
In 2018, Cylance® observed a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to...by Brian McCarthy | Apr 26, 2019 | CASB, Case Studies, Cloud, Cybersecurity, Data Breach, Premium content
Migration to the cloud presents many unique challenges in protecting your data. A new generation of technologies called Cloud Access Security Brokers (CASBs) has emerged with the sole purpose of protecting corporate data while embracing cloud applications and...by Brian McCarthy | Apr 24, 2019 | CASB, Case Studies, Cloud, Cybersecurity, Data Breach, Premium content
CASB — cloud access security broker — it’s the fastest growing security category ever — or so Gartner has claimed. And in the age of the cloud, in the age of data, security takes on a new level of importance but also complexity. Take the castle There was a time when...by Brian McCarthy | Apr 21, 2019 | Artificial Intelligence, Blog, Cybersecurity, Data Breach, Email Security, Endpoint Security, malware, Phishing, Ransomware, Security
Hacker groups going after government domains Security researchers are suspecting state-sponsored actors. Imagine typing in a government internet address, and ending up on a website that looks like a government website, acts like a government website, but steals your...