Heading into 2021, enterprises have more endpoints to secure than ever. And fortified by its acquisition of Panda Security, WatchGuard Technologies now has a stronger endpoint security strategy. Corey Nachreiner and Marc Laliberte discuss the dual evolution of targeted attacks and endpoint security solutions.
Steve Jobs once said: "Marketing is about values." But how well is the cybersecurity solutions message being received amid the convergence of pandemic and economic strains? We brought an outspoken group of CMOs and CISOs together to discuss the topic.
When it comes to a breach and exposed data, a Digital Risk Protection program represents a way to reduce the potential damage. Tyler Carbone of Terbium Labs outlines the essential elements and use cases of a mature DRP program.
John McAfee, the founder of the cybersecurity firm that bears his name who also is a serial entrepreneur and a former presidential candidate, has been charged with federal income tax evasion. Plus, the SEC is accusing him of promoting initial virtual coin offerings without disclosing he was paid to do so.
2020's health crisis has created an unexpected boom in telemedicine initiatives. But with this rapid innovation and adoption comes a corresponding uptick in fraud. Dean Nicolls of Jumio Corporation talks about how improving identity verification can help curb the trend.
Join CrowdStrike VP of Product Marketing Ian McShane and Zscaler Director of Transformation Strategy Nathan Howe as they offer insight into how cloud and endpoint security can join hands to strengthen security protection, detection and remediation.
Ransomware continues to pose a "significant" threat, and email remains one of the top attack vectors being used by both criminals and nation-states, Australia's Cyber Security Center warns in its latest "Cyber Threat Report," which urges organizations to improve their defenses.
It used to be that employees needed special permission to work at home; now they need it to return to the office. In this new world of "work from anywhere," what are some of the biggest myths and realities? Aaron Maben of Cradlepoint shares his list.
In this on-demand webinar, a panel of experts from eSentire and VMware Carbon Black discuss how the MITRE ATT&CK framework can be leveraged to better understand the tactics and techniques used by threat hunters and defenders to classify attacks and assess an organization's risk.