391 posts
The hunter becomes the hunted: How cyber counterintelligence works
Counterintelligence takes as a jumping off point one basic premise: if someone is going to attack your company, the best defense is a good offense.
Data Breaches vs. Ransomware: What’s the Difference?
Cybercriminals are now using hacking attacks and insider attacks to gain access to endpoints and extract data from within the organisations network. However, a data breach in which the data is held for ransom is not the same as a Ransomware attack.
What happens when I decline an app’s permission request?
When you install a new app, it often asks for permission to access other resources – what happens if you say no?
Silvia Barrera: “Cybersecurity never costs more than the damage that can be inflicted”
The Panda Security Summit (#PASS2018), our advanced cybersecurity summit, is now less than two weeks away. This event will bring together CISOs and CIOs from…
The danger of unstructured data
The countdown is drawing to an end. May 25 looms on the horizon and adapting to the GDPR has gone from being a task that needs to be addressed in the future to an imminent obligation.
Memcached, the latest DDoS attack
Memcached has become cybercriminals weapon of choice to carry out DDoS attacks.To prevent it is crucial to have a detection and mitigation plan.
How can I protect my company’s VPN?
VPN stands for virtual private network. Simply put, it’s a private network created on the internet or within another network.