The crypto community has been trying to prepare for the transition to "quantum-resistant" algorithms - that is, algorithms that are secure against an attack by a quantum computer.
Download this whitepaper and learn:
The difference between quantum computing versus quantum encryption;
What the current quantum...
With roughly six months to go before the GDPR enforcement deadline, it's time for organizations to assess whether "They need to panic a little, or they need to panic a lot."
Download this whitepaper about GDPR readiness that discusses:
The global state of GDPR readiness
The areas where organizations struggle most...
With roughly six months to go before the GDPR enforcement deadline, Petter Nordwall and Anthony Merry of Sophos says it's time for organizations to assess whether "They need to panic a little, or they need to panic a lot."
Our increased dependence on machines is so profound that even the definition of machine is undergoing radical change. The number and type of physical devices on enterprise networks has been rising rapidly, but this is outstripped by the number of applications and services they host.
At the same time, cloud adoption...
A recently published 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organizations implemented security controls for SSH keys. The results show that most organizations are underprepared to protect against SSH-based attacks, with fewer than half following industry...
Take control of your SSH keys to minimize your risk of intrusion
SSH keys provide the highest level of access rights and privileges for servers, applications and virtual instances. Cyber criminals want this trusted status and invest considerable resources into acquiring and using SSH keys in their attacks.
Even...
With less than two months left in the year, incidents involving hackers are dominating the federal tally of health data breaches for 2017, a trend some security experts expect to continue.
A Belgian security researcher has discovered a "serious weakness" in the WPA2 security protocols used to encrypt many WiFi communications. Attackers can exploit the flaws to eavesdrop as well as potentially inject code such as malware or ransomware into WiFi-connected systems. Prepare for patches.
Modern enterprises are in the midst of a digital revolution, adapting to the demands of Business 2.0. They are looking to embrace new business opportunities, expand into new markets, and propose new product offerings, as well as be more agile in responding to existing demands. This transformation relies on digital...
The malicious use of encryption is growing at an alarming rate according to NSS Labs' BaitNET test infrastructure. Why? Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control and data exfiltration....
It difficult to decide whether to replace or to augment existing endpoint protection (EPP) because it is difficult to assess advanced endpoint protection (AEP) products as measuring some of their features can be complicated.
AEP products are promising a new standard in endpoint security, but when should...
Ransomware is on its way to becoming a $1 billion industry, by some estimates, and possibly 50 percent of enterprises have dealt with it so far. Darius Goodall of Barracuda discusses the best way to defend against the newest strains.
Download this interview transcript and learn about:
The drivers behind ransomware...
Worried about the use of encryption by terrorists, Australia plans to lobby its key signal intelligence partners at a meeting in Canada for the creation of new legal powers that would allow access to scrambled communications. But Australia says it doesn't want backdoors. So what does it want?
Victims of Jaff and EncrypTile ransomware can take advantage of two new free tools from security firms that exploit weaknesses in the malware crypto to forcibly crack encrypted files on demand - no potential ransom-payment required.
The WannaCry Ransomware is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally.
Download this eBook to learn how to be prepared to quickly address the growing threat of ransomware and limit your company's exposure to future...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.