• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:ransomware

Five worthy reads: Cybercrime and its impact on the economy

General | April 11, 2022

Five worthy reads: Cybercrime and its impact on the economy

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Endpoint management: A must-have for the financial sector

General | April 7, 2022

Endpoint management: A must-have for the financial sector

It's almost that time of the year to file taxes in Portugal, so John opens the email he...

Massive ransomware attacks of 2021 and how to avoid them

Endpoint Central | February 9, 2022

Massive ransomware attacks of 2021 and how to avoid them

2021 brought a new wave of cyberattacks that proved to be detrimental to the era of...

Five worthy reads: Congratulations! You have just been socially engineered

General | December 17, 2021

Five worthy reads: Congratulations! You have just been socially engineered

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Five worthy reads: The never-ending love story between cyberattacks and healthcare

General | August 6, 2021

Five worthy reads: The never-ending love story between cyberattacks and healthcare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Ransomware in 2021: What has changed? Detection and mitigation strategy

Log360 | March 10, 2021

Ransomware in 2021: What has changed? Detection and mitigation strategy

A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...

User and entity behavior analytics: The intelligent guardian of your business

Log360 | August 5, 2019

User and entity behavior analytics: The intelligent guardian of your business

Identities are easy to fake, but not actions. Closely monitoring the behavior of a person...

Five worthy reads: The rising notoriety of Ransomware-as-a-Service (RaaS)

General | May 10, 2019

Five worthy reads: The rising notoriety of Ransomware-as-a-Service (RaaS)

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

10 best practices to defend against GandCrab ransomware 

Endpoint Central | April 2, 2019

10 best practices to defend against GandCrab ransomware 

Ransomware has become the primary cyberthreat organizations worry about, especially after...

How to avoid getting tricked by hackers this Halloween

General | October 29, 2018

How to avoid getting tricked by hackers this Halloween

While everyone prepares for the frights of Halloween, there's a real evil lurking just...

IT Security | April 27, 2018

Ransomware attacks continue to rise in 2018

It's official. Ransomware isn't just one of the most common types of malware, it is the...

Gold Lowell uses SamSam ransomware to terrorize SMBs

IT Security | March 2, 2018

Gold Lowell uses SamSam ransomware to terrorize SMBs

From late December 2017 to mid January 2018, several small and medium businesses found...

Page 2 of 4«1234»Last »