EventLog Analyzer | April 24, 2018Connecting the logs with event correlation Starting with the basics Security information and event management (SIEM) helps with...
IT Security | February 13, 2018Ransomware attackers and victims fall victim to ransom theft Recently, there has been a string of attacks affecting some ransomware victims who pay...
Endpoint Central | October 20, 2017What companies should know about the Kaspersky breach While enterprises around the world are preparing themselves for external hacking attempts...
Endpoint Central | October 13, 2017Free e-book: Six best practices for escaping ransomware Breaking news about cyber attacks has reached an all-time high recently, with ransomware...
Endpoint Central | September 15, 2017Secure your endpoints: Locky ransomware launches massive email campaigns Just when organizations were starting to feel safe after WannaCry and Petya, security...
Endpoint Central | August 25, 2017Using Foxit Reader? You might be vulnerable to network breaches Cybersecurity and cyberattacks have become prominent topics lately. No matter how much...
Endpoint Central | August 4, 2017Prevent CowerSnail network breaches with the right patch management solution. It's hard to keep note of all the malware that's been unleashed in last three months; the...