-
Threat monitoring for SMBs and enterprises can be a complicated, daunting business, but following some basic best practices learned on the front lines can help.
-
Microsoft's recent buzz about generative AI has had less to do with multimodal models and more to do with the law -- as in improving it and also bending it.
-
Ransomware specialist Veeam Software announced a new cloud storage service to securely store backup data off-site in an always-immutable and encrypted format, just as the firm published a new ransomware trends report.
-
During this week's RSA Conference, the CSA announced new guidance for organizations to successfully implement AI, with recommendations focusing on security and compliance.
-
Earlier predictions of a decline in ransomware attacks have not borne out and organizations in the healthcare sector -- where sensitive data abounds -- are being hit particularly hard, according to a new report from Zero Trust data security specialist Rubrik.
-
Like many other industry sectors, healthcare execs see advanced AI as kind of a double-edged sword, being a top priority while also a significant challenge.
-
A new report on the state of AI and security indicates security pros express "cautious optimism" about AI helping them out, while not being too concerned about being replaced by said AI.
-
By Tom Fenton
After a series of articles on the enterprise-grade Tailscale VPN whose free version suits his needs just fine, Tom demonstrate his quick-and-easy process of utilizing the VPN on a home network-attached storage setup.
-
Cloud security specialist Zscaler says enterprises must both securely enable AI productivity tools and also leverage AI to defend against new AI-driven threats.
-
By Tom Fenton
Tom continues to be impressed by Tailscale, which saved his skiiing trip when a co-worker urgently needed some files from his home server.
-
After using the private preview of Exposure Management for some months, Paul outlines what it does, why you should care and raises some still unanswered questions.
-
Google introduced a new cloud security offering that melds the cloud giant's AI-powered SecOps tech with Mandiant's on-call human threat experts.
-
By Tom Fenton
Tom sets up remote access to his home lab, adds Linux and cloud devices, explores Tailscale's features and technology -- and really likes what he sees.
-
By Tom Fenton
Tom didn't think remotely accessing local computing resources would be as easy as advertised, but it was: "It just worked out of the box."
-
Veeam Software has entered an AI-centric partnership with Microsoft that sees the companies jointly developing new AI solutions around Microsoft's Copilot AI assistant and Veeam's new Data Cloud.
-
We are often warned of the dangers of bring-your-own-device (BYOD) policies in hybrid workforce scenarios: data leakage, exposure of sensitive information and so on. But what about the other side of that coin: organizations spying on workers through their personal devices?
-
With the cloud being a natural fit for advanced AI systems spearheaded by the likes of AWS, Google Cloud and Microsoft Azure, a bevy of third-party security vendors have been releasing AI-powered cloud security tools at a remarkable rate.
-
Veeam Software today announced its new Data Cloud offering, providing its data protection and ransomware recovery platform as a cloud service built on Microsoft's Azure cloud computing platform.
-
Paul presents a brief overview of Enterprise Internet of Things (EIoT) and Operational Technology (OT), and how you can use Microsoft Defender for IoT to protect both, as well as integrate everything into a single Security Operations Center (SOC) solution.
-
New cybersecurity research from AI leaders Microsoft and OpenAI reveals how generative tech is being put to use by known threat actors, including nation-state-affiliated groups from countries including China, Iran, North Korea and Russia.
-
Along with purpose-built technology to combat ransomware, Veeam Software's new Cyber Secure Program also offers up a team of experts to help organizations wield that tech to fight threat actors.
-
Paul details what you need to do to prepare your business for different Copilots, because if you don't have good data governance, you'll likely have some "interesting times" ahead if you roll out the AI broadly.
-
New research from Cohesity indicates many organizations are breaking "do not pay" policies and going against general guidance to pay off ransomware demands, writing off the payments as the "cost of doing business."
-
Ransomware is still plaguing IT -- it's still the No. 1 cause of outages -- but dissatisfied data protection pros seeking new jobs present a new concern, a new survey-based report indicates.
-
Along with "traditional" ransomware attacks, the threat actors are continually upgrading their game with new approaches, technology and techniques. Here's what organizations need to know.