Security News > 2022 > July

Making Sense of EPP  Solutions: Reading the 2022 MITRE ATT&CK® Evaluation Results
2022-07-25 00:00

According to the Fortinet February 2022 Global Threat Landscape Report, industries worldwide experienced a dramatic 15x growth in ransomware volume over the past 18 months, with sustained volume throughout 2021. Attacks are harder to stop because of the evolution of increasing capabilities thanks to a very active economy of threat actors with fresh code for sale.

Reduce Ransomware Risk With the Fortinet Security Fabric
2022-07-25 00:00

Today's organizations have a broad digital attack surface spanning a diverse set of devices, user locations, networks, and clouds, providing many avenues of entry and exfiltration for cybercriminals. Increasingly, these cybercriminals are doing more than stealing data, often encrypting whole systems and interrupting business operations with ransomware, a threat that's increased 15x over the past 18 months.

Considerations for Evaluating Endpoint Detection and Response (EDR) Solutions – Infographic
2022-07-25 00:00

Endpoint security solutions range from signature-based endpoint protection platform or antivirus solutions to extended detection and response platforms that tie multiple security solutions together. Organizations that are evaluating endpoint detection and response solutions need to ensure that the products they are considering will meet their needs in the following areas.

Ransomware Risks and Recommendations – Infographic
2022-07-25 00:00

Not to mention the negative financial impacts and reputational damage that ransomware can cause. The overall frequency of ransomware detections might be leveling off, but the sophistication, aggressiveness, and impact of this threat continues relentlessly.

IDC Building Ransomware Resilience
2022-07-25 00:00

Ransomware has become a popular weapon in the hands of malicious actors who try to harm governments, businesses, and individuals daily. Ransomware is the final stage of a more complex attack.

Top Four Steps to Reduce Ransomware Risk
2022-07-25 00:00

IT leaders must integrate security tools into a cooperative, consolidated ecosystem using a composable and scalable cybersecurity mesh architecture approach. By 2024, organizations adopting a CSMA to integrate security tools to work as a collaborative ecosystem will reduce the financial impact of individual security incidents by an average of 90%. Backing this with well-trained, skilled, and practiced employees, staff, and service providers helps organizations greatly reduce their risk of ransomware.

Top Nine Criteria When Selecting An Endpoint Detection and Response (EDR) Solution
2022-07-25 00:00

Endpoint security solutions range from the original antivirus solutions of yesteryear to extended detection and response platforms that tie multiple security solutions together for a better ecosystem. As the needs arise for endpoint security solutions, vendors will attempt to make their solutions match buyer expectations and analyst terms through their messaging but not their engineering.

The Effective Use of AI to Speed Detection and Response
2022-07-25 00:00

According to Gartner's Case-Based Research, the three most pervasive challenges that AI addresses are lack of detection capability, inadequate security posture, and poor operational efficiency. In many ways, cybersecurity is becoming a big data problem, given the volume and sophistication of cybercampaigns.

#AI
How an Intelligent Network Can Unburden IT Teams – Checklist
2022-07-25 00:00

Today's networks are expected to do more than deliver connectivity and bandwidth. To optimize performance and enable additional functionality, a network needs to be intelligent.

Why Security Is a Top Influencer of Network Performance
2022-07-25 00:00

To stay competitive, a high-performing network that meets the needs of digital acceleration initiatives is critical. Sometimes it's difficult to know what to focus on, as there are a lot of different factors that can impact performance, from the architecture chosen, to the age of the equipment, to the client devices.