There was no shortage of data breaches making news last year – let’s take a look back at some of the biggest and most damaging data breaches of 2016.
We’ve seen a lot of reports on encrypted messaging applications in the news recently, but one question remains unanswered: are data leaks via these applications a real risk for enterprises today?
Our latest demo looks at the Digital Guardian endpoint agent’s ability to detect stealthy malware C&C communications designed to evade detection by network security tools.
Flash drive-by downloads and malvertising continue to be common attack vectors for malware infections. Here's a look at how these attacks can be detected and stopped based on behavioral characteristics.
IoT technology is in its infancy, yet has already developed a reputation for poor security. As connected devices become more engrained in our day to day business and personal lives, producers of IoT technology should follow these six tips to shore up IoT security.
So-called advanced persistent threats (APTs) have been the subject of much hype of the past few years – but that doesn’t mean we should be overlooking the truly advanced threats out there.
Put those hot glue guns away – here’s how to detect and mitigate USB propagating malware.
Dridex keeps coming back with a vengeance - let's take a look at how the malware works and what can be done to stop it.
The unveiling of the Podec Trojan by Kaspersky once again demonstrates the risks involved with downloading mobile applications from untrusted or unofficial app stores.
With up to 80 million customer records exposed, this could be among the largest data breaches in U.S. history - but what really happened to Anthem?