The Top Cybersecurity Threats of 2017

In the world of cybersecurity, the year 2016 will be remembered for some big moments: the largest known distributed denial of service (DDoS) attack; multiple successful breaches of the SWIFT banking system; a phishing attack on a United States presidential candidate’s campaign.

Spotlight

Logpoint

Logpoint provides a converged cybersecurity platform that empowers organizations to thrive in a world of evolving threats. Established in 2012, Logpoint has consistently championed the mission of fortifying the digital heart of organizations. With a foundation built on excellence, we've emerged as leaders in the ever-evolving world of cybersecurity. Our team, anchored by a unified vision, delivers advanced cybersecurity solutions that champion business growth. At Logpoint, we balance innovative strides with the essence of security. Our distinct edge? We don't trail trends – we define them, leveraging state-of-the-art technologies for timely threat insights. Through strategic collaborations, we're always a step ahead, crafting solutions that resonate with real-world challenges. Our reputation thrives on realizing our customers' aspirations, always going the extra mile. Join our movement towards a safer digital tomorrow. Stay updated with us on LinkedIn or dive deeper at www.logpoint.

OTHER WHITEPAPERS
news image

Harness Advanced Push-to-talk to Transform Physical Security Operations

whitePaper | December 21, 2022

Hytera’s mission is to develop the future-proof solutions with a holistic approach to your critical communications system and service needs, support public safety agencies in making the city safer, and enable security organisations to keep the enterprise more secure and ensure the safety and security of responders and staff, through driving more efficiency, effectiveness and productivity to operation and management of both daily operations and critical emergencies, while reducing the cost.

Read More
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More
news image

Dell PowerScale OneFS: Security Considerations

whitePaper | December 28, 2022

In the age of Digital Transformation, organizations must adapt to modern data requirements and implement new features for the transformation life cycle. Throughout this process, protecting data is vital as it is an organization’s most valuable asset. This document describes how to maintain an aggressive security posture for a PowerScale OneFS cluster and meet industry security requirements.

Read More
news image

The Economic Impact of Cyber Attacks

whitePaper | December 29, 2022

Businesses make up the core of an economy. And cyberattacks are among the topmost risks faced by any business organization irrespective of its size and domain of operation. Therefore, it is well established that cyber-attacks have a significant economic impact. Most of the attacks and breaches are financially motivated.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More

Spotlight

Logpoint

Logpoint provides a converged cybersecurity platform that empowers organizations to thrive in a world of evolving threats. Established in 2012, Logpoint has consistently championed the mission of fortifying the digital heart of organizations. With a foundation built on excellence, we've emerged as leaders in the ever-evolving world of cybersecurity. Our team, anchored by a unified vision, delivers advanced cybersecurity solutions that champion business growth. At Logpoint, we balance innovative strides with the essence of security. Our distinct edge? We don't trail trends – we define them, leveraging state-of-the-art technologies for timely threat insights. Through strategic collaborations, we're always a step ahead, crafting solutions that resonate with real-world challenges. Our reputation thrives on realizing our customers' aspirations, always going the extra mile. Join our movement towards a safer digital tomorrow. Stay updated with us on LinkedIn or dive deeper at www.logpoint.

Events