About 50% of respondents have reported that they have experienced a security breach because one or more of their security products was not working as...
Beware: Attackers are finding new ways to avoid detection when they compromise email accounts. Researchers from Barracuda and UC Berkeley, conducting a large-scale analysis of...
According to the report, 60% of initial entries into victims’ networks that were observed leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers...
Check Point’s researchers highlight Yahoo! as most imitated brand for email-based phishing, and Spotify as the most imitated for web-based phishing attempts. Check Point Research’s...
IBM Security and McAfee, in association with OASIS, are leading an industry initiative to bring interoperability and data sharing across cybersecurity products. The OASIS international...
Trend Micro delivers advanced security solutions for Evalueserve. Trend Micro Deep Security was implemented across their 19 ESX servers for 100 virtual servers and 1,300...
Forcepoint has unveiled the findings of an Asia Pacific study conducted by leading IT analyst firm Frost & Sullivan, revealing that Asia Pacific (APAC) organizations’...