
Our research shows that an average enterprise uses 68 security tools from 32 vendors, so the platform concept has become the preferred deployment model in this world of multiple security and networking vendors since it helps simplify operations.
Our research shows that an average enterprise uses 68 security tools from 32 vendors, so the platform concept has become the preferred deployment model in this world of multiple security and networking vendors since it helps simplify operations.
Infoblox Inc. recently published a second threat report to provide updates on the remote access toolkit, or RAT, called “Decoy Dog,” which the company discovered in April. To establish command and control, Decoy Dog uses the Domain Name System. The company also suspects it’s a secret tool nation-states use in cyberattacks.
When faced with a ransomware attack, organizations and government agencies need to have robust protocols in place to respond quickly. The importance of regular and secure backups cannot be overstated. The City of New Orleans learned this lesson firsthand during a complex and time-consuming backup and recovery process following a ransomware attack.
Cisco Systems Inc. will hold its annual Cisco Live user event next week in Las Vegas as the networking giant is coming off an impressive quarter in which Chief Executive Chuck Robbins (pictured) set a more than positive outlook for the company.
Veeam used its annual user event, VeeamON, in Miami this week to release the results of some research on ransomware highlighting some alarming statistics that raise concerns for businesses of all sizes. Veeam is a backup and recovery company, so one might wonder why it’s releasing research in cyber security.