Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
Despite an overall shift away from traditional ransomware in favor of crypto-mining malware, research shows that ransomware is still alive and well in the form of highly targeted attacks.
As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization's endpoint security strategy.
Corporate VPN security still plays a vital role in protecting enterprise networks, but it is no longer sufficient to prevent unauthorized third-party or privileged access on its own.
Unified endpoint management (UEM) delivers on the promise of bringing a vast range of endpoints and enterprise use cases under one management console.
When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?
To improve endpoint management in today's threat landscape, IT organizations must embrace collaborative defense by integrating tools into a cohesive security ecosystem and sharing threat intelligence.
For IT and security leaders, the ability to manage devices, apps and content are critical to end-user productivity and the protection of corporate information. There are two popular methods for doing this across smartphones, tablets, laptops and...
Two-Thirds of IT Professionals Believe Their Endpoint Security Tools Won’t Prevent a Major Malware Attack
According to a recent survey, two-thirds of security professionals believe their endpoint security tools are insufficient to protect their organizations from malware.