-
Threat Runner emulates an authentic malware infection on an organization’s network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data.
June 28 -
The firm has introduced a team of professional "good guy" hackers to show businesses just how embarrassing a breach can be — and how to prevent it.
June 26 -
Following a week and a half of downtime after a security event, Cetrom has deployed AI as well as three additional new technologies to protect their clients.
June 3 -
The cloud hosting company was hit by a malicious virus and chose to shut all systems down to proactively prevent widespread data loss.
May 30 -
It's easier than ever for cybercriminals to gain access to a firm’s entire network. Can the good guys win this fight?
May 29 -
Don't wait for a breach to shore up your defenses -- and to help your clients protect themselves.
May 28Accounting Today -
On May 24, cloud hosting provider Cetrom apparently experienced an outage, with the company’s website and support communication lines still down as of May 28.
May 28 -
Deloitte has expanded its strategic alliance with Relativity to offer Relativity Trace, a compliance monitoring application, to help clients detect and mitigate violations of industry regulations and organizational e-communication policies.
May 21 -
The service offered instructions on how to claim an extension, among other things.
May 14 -
Wolters Kluwer's response to a malware attack left many users feeling uninformed.
May 13