2020 SONICWALL CYBER THREAT REPORT

February 12, 2020

The boundaries of your digital empire are limitless. What was once a finite and defendable space is now a boundless territory a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users. Explore SonicWall’s exclusive threat intelligence to help you better understand how cybercriminals think  and be fully prepared for what

Spotlight

Sonatype

The Sonatype journey started 15 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven, to supporting the world’s largest repository of open source components (Central), to distributing the world's most popular repository manager (Nexus), we’ve played a meaningful role in helping the world embrace the power of open innovation.

Other Infographics
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More
news image

The Importance of Active Directory Security Best Practices

Infographic | February 9, 2022

There’s no silver bullet solution to cybersecurity, a layered defense is the only viable defense. Active directory (AD) security best practicesare crucial because they are central to many vulnerable functions, such as Network access.

Read More
news image

The future of cybersecurity in a digital world

Infographic | February 2, 2020

Data-driven technologies change the way the world works. And the more connected devices flourish, the more cybersecurity matters. There are more digitally connected devices than ever before—and the world is just getting started.

Read More
news image

Cybersecurity for Small Businesses

Infographic | May 25, 2021

Small businesses often ignore security precautions. Sometimes it’s due to a lack of resources, other times it’s because they think hackers won’t care. On the contrary, 58% of all malware attacks are targeted at small businesses, because hackers know there is no proper security in place.

Read More
news image

CYBER SECURITY EXPOSURES INFOGRAPHIC

Infographic | January 16, 2020

It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the case today. Small businesses generally have fewer IT resources and devote less time and money to cybersecurity than their larger counterparts.

Read More
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More

Spotlight

Sonatype

The Sonatype journey started 15 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven, to supporting the world’s largest repository of open source components (Central), to distributing the world's most popular repository manager (Nexus), we’ve played a meaningful role in helping the world embrace the power of open innovation.

Events