Cybersecurity, Ransomware and Email Fraud in a Year that Changed the World
As the global pandemic upended work and home routines in 2020, cyber attackers pounced. Dive deep into how this…
A Six-Step Plan for Stopping Payment Redirection, Supplier Invoicing Fraud and Gift Card Scams
Sometimes, that email from your boss isn't really an email from your boss. Business email compromise (BEC)…
For decades, perimeter-based security strategies have been the starting point for most cybersecurity programs. But in today's cloud-based, mobile and remote work setting, that perimeter has all but dissolved. Learn…
BlackBerry® Alert is a critical event management (CEM) solution designed to help organizations prepare for, respond to, and recover from disruptive events, enhancing
operational resilience, reducing costs, and keeping people safer.
Read…
Most security leaders know that an effective security awareness program can play an outsized role in reducing risk. But measuring and communicating the impact of your security awareness program to…
Did you know the average annual cost for insider threats is now $11.45M, according to Ponemon Institute? It's a growing problem as remote teams become the new work reality.
How do…
Most security leaders know that insider threats are serious and evolving cybersecurity risk. But many struggle with communicating those risks to other executives-and getting buy-in to make investments that count.…
Data doesn't move itself. People-whether they are negligent, compromised or malicious-move data in secure and risky ways. Legacy approaches to data loss prevention (DLP), building walls around your critical data,…
Symantec is now part of Broadcom, a semiconductor manufacturing company. For Symantec customers of all sizes, the transition has been a bumpy one. The changes have impacted renewals, support and…
Data doesn't move itself. People-whether they are negligent, compromised or malicious-move data in secure and risky ways. Legacy approaches to data loss prevention (DLP), building walls around your critical data,…
Cyber criminals are getting bolder and more sophisticated with their threats. No matter what kind of business you are in, you are likely to run into ransomware threats. During a…
Our digital world is generating a massive explosion of data coming from multiple communication channels. Legacy archiving systems are struggling to keep up. To ensure compliance, easily legal e-discovery and…
