Blog
This is the first article in a three part series on building effective compliance programs. Compliance is a pass or fail obligation. But achieving compliance, by contrast, can be a slow and systematic process.
Read moreA phishing campaign used a 鈥渂roken鈥 file attachment to help its malware payload evade detection by both automated and manual analysis tools.
Read moreThis article聽originally appeared聽on the AppRiver blog.
Read moreAn attack campaign is using both the Emotet and TrickBot trojan families to infect unsuspecting users with Ryuk ransomware.
Read moreThis article was聽originally published聽on the AppRiver blog.
Read moreEvery year, the U.S. Internal Revenue Service (IRS) releases its 鈥淒irty Dozen鈥 list. This compilation covers some of the most common types of scams that target taxpayers each tax season.
Read moreTwo ongoing phishing campaigns are leveraging Microsoft鈥檚 Azure Blob Storage in order to steal users鈥 Outlook and Microsoft account credentials.
Read moreNowadays, digital attacks are a serious concern for organizations. One need only look to the growing costs of digital crime to understand why.
Read moreMachine Learning and Artificial Intelligence are Everywhere If you attended the RSA conference, or any other recent security conference, you鈥檝e probably noticed that many vendors pitch machine learning and artificial intelligence as the latest and greatest ways to defen
Read moreCompliance is full of layers. Exploring and dealing with one layer often reveals another underneath.聽And the deeper you get, the harder it can be to understand the whole.
Read moreBy now, it鈥檚 a foregone conclusion that intellectual property is one of the most valuable assets any company owns. Leaving this resource vulnerable is an unacceptable risk, which is why protections like nondisclosure agreements and copyright protections are considered standard.
Read moreA family of information-stealing malware known as 鈥淪epar鈥 is preying on businesses by using what are known as 鈥淟iving off the Land鈥 techniques.
Read more