Chris Perram Interviewed as Part of Intralinks Deal Flow Protector
Chris sat down with Intralinks to talk about artificial intelligence and machine learning in M&A.
Insights on Data Security & Threat Intelligence
Chris sat down with Intralinks to talk about artificial intelligence and machine learning in M&A.
The last thing any company needs during the holiday season is the gift of ransomware on its IT systems. During this week’s build-up to Black Friday, Cyber Monday, and the actual holidays (remember those?), everyone is going to spend some time doing a little shopping while on a company device
When was the last time you assessed the effectiveness of your email security? Email is the main vehicle for introducing malware into an organization, so it is imperative that you do so. Here at Cyren we know how eye-opening such an evaluation can be, because during September and October, we
Enterprise Analytics: Searching, Clustering, and Learning – Oh My! Have you ever put together a 1,000-piece puzzle without a picture to reference as you work? The task is time-consuming, frustrating, and seemingly impossible. After turning over each piece, you slowly begin to notice how the disparate shapes and images can
Emails containing malicious attachments equipped with keyloggers and screen capture capabilities are targeting businesses worldwide, with noted attacks in Asia, Russia, and the Middle East. The campaign is designed to look like it comes from real affiliates and employees working for a well-known pharmaceutical distributor in order to make the
There appear to be only two things that are certain in life: death and cybercriminals trying to steal your tax refund. As governments have moved tax systems online to facilitate life for the taxpayer, refund scams using phishing and social engineering to obtain personal financial information have become epidemic, with
The Requirement for Classification as part of GDPR Compliance Data privacy in the scope of the GDPR requires a clear understanding of the data you retain. What type of data is being stored, where it is being stored, and who is accessing it are the guiding principles, and classification of this data
Locky, the ransomware which dominated 2016 and then disappeared for the first half of 2017, has been completely rescuscitated during the past three months with a series of new variants, and demanding three times the ransom rate. A possible reason for its disappearance and reemergence was explored in a recent
Locky, die Ransomware, welche 2016 dominiert hat und dann in der ersten Jahreshälfte von 2017 verschwunden ist, wurde mit einer Reihe neuer Varianten in den vergangenen drei Monaten zu neuem Leben erweckt und fordert jetzt das Dreifache des Lösegelds. Ein möglicher Grund für sein Verschwinden und Wiederauftreten wurde im aktuellen