Carbon Black 2017 Threat Report

June 15, 2017

As the calendar shifted from December 2016 to January 2017, the prospect of a large-scale cyberattack loomed. Questions over the possible hacking of the 2016 U.S. presidential election swirled and businesses faced a growing attack vector in ransomware. In 2016, ransomware was estimated to be an $850 million crime. As we shift to 2018, questions still exist regarding the politics and possibility of a hacked democracy, but one thing is abundantly clear—2017 saw several large-scale cyberattacks including WannaCry, NotPetya, and BadRabbit demonstrating that ransomware is not going anywhere. Ransomware is now estimated to be a $5 billion crime, according to research from Cybersecurity Ventures.

Spotlight

Cloud Range

Cloud Range is the world’s most trusted full-service cyber readiness training platform. By implementing an ongoing training program with live-fire cyberattack scenarios, security teams can ensure that they have essential skills and experience to take on today’s complex threat landscape. Only Cloud Range offers the breadth of services to help organizations hire, train, upskill, and retain. Live-fire cyberattack simulations enable the whole security team to work togetherto defend against the latest threats. Hands-on training modules improve cybersecurity skills and abilities. Hiring assessments ensure the right people are in the right seats with a plan for growth. Tabletop 2.0 exercises improve communication and critical thinking from the newest analyst to the C-suite. Plus, Cloud Range is full-service, so we take care of all the administration and coordination.

OTHER WHITEPAPERS
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Best Practices for Row Level Security in Tableau with Entitlements Tables

whitePaper | January 18, 2023

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Security Overview Whitepaper

whitePaper | February 6, 2023

All encryption/decryption operations are only performed by RoboForm locally on user’s devices and never on the RoboForm Server. RoboForm Data Objects and other user data is never sent to the Server in an unencrypted form. All communication between RoboForm Clients and Server are conducted over encrypted channels only.

Read More
news image

HackerPowered Security Report 2022 By HackerOne

whitePaper | March 14, 2023

Security automation cannot replace the creativity of humans. In fact, 92% of ethical hackers say they can find vulnerabilities scanners can’t. For the past six years, we’ve been surveying hackers to learn more about how they see the evolving security testing industry. We combine these insights with the world’s largest dataset of vulnerabilities to identify trends that inform our customers how to build an impactful security strategy.

Read More
news image

Autodesk® Fusion 360 Security Whitepaper

whitePaper | October 27, 2022

Autodesk® Fusion 360™ is the first 3D CAD, CAM, and CAE tool of its kind. It connects your product development process in a single cloud-based platform that works on both Mac and PC. The Fusion 360 tools enable fast and easy exploration of design ideas with a secure and integrated concept-to-fabrication toolset that extends to include web browsers and mobile devices.

Read More

Spotlight

Cloud Range

Cloud Range is the world’s most trusted full-service cyber readiness training platform. By implementing an ongoing training program with live-fire cyberattack scenarios, security teams can ensure that they have essential skills and experience to take on today’s complex threat landscape. Only Cloud Range offers the breadth of services to help organizations hire, train, upskill, and retain. Live-fire cyberattack simulations enable the whole security team to work togetherto defend against the latest threats. Hands-on training modules improve cybersecurity skills and abilities. Hiring assessments ensure the right people are in the right seats with a plan for growth. Tabletop 2.0 exercises improve communication and critical thinking from the newest analyst to the C-suite. Plus, Cloud Range is full-service, so we take care of all the administration and coordination.

Events