1 430 431 432 433 434 489 3024 / 3418 POSTS
Building a strategic threat intelligence program

Building a strategic threat intelligence program

Jon Oltsik, an analyst at Enterprise Strategy Group in Milford, Mass., looked back at ESG research conducted in 2015 on strategic threat intelligence ...
F-Secure buys Little Flocker to combat macOS ransomware

F-Secure buys Little Flocker to combat macOS ransomware

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has acquired Little Flocker, a macOS applicatio ...
Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer

Self-Proclaimed ‘Nuclear Bot’ Author Weighs U.S. Job Offer

The author of a banking Trojan called Nuclear Bot — a teenager living in France — recently released the source code for his creation just months after ...
Top 5 email security best practices to prevent malware distribution

Top 5 email security best practices to prevent malware distribution

A trusted channel Email is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employ ...
Smackdown: Office 365 vs. G Suite management

Smackdown: Office 365 vs. G Suite management

When you choose a productivity platform like Microsoft’s Office 365 or Google’s G Suite, the main focus is on the platform’s functionality: Does it do ...
Six in 10 people believe their lives will improve with autonomous vehicles

Six in 10 people believe their lives will improve with autonomous vehicles

Six in 10 people believe connected and autonomous vehicles (CAVs) will improve their quality of life, according to a new study by Strategy Consulting ...
U.S. may expand laptop ban to more airports

U.S. may expand laptop ban to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops and other electronics into the cabin for certain flights fro ...
1 430 431 432 433 434 489 3024 / 3418 POSTS