Zephyrnet Logo

Tag: networks

How to harness the collective intelligence of the enterprise

The collective intelligence of the group has long been extolled by companies as a good thing -- mitigating individual... biases of all sorts....

Comodo publishes strategic analysis of 97M malware incidents in Q2

Reading Time: 4 minutesComodo publishes strategic analysis of 97 million malware incidents in Q2 Comodo detected and analyzed nearly 100 million incidents in Q2...

A rational take on cryptocurrencies

What they are and what they’re not. Probably.Here at Coin Sciences, we’re best known for MultiChain, a popular platform for creating and deploying...

Comodo Q1 2017 Threat Report: Russia is World’s No. 1 Malware Target

Reading Time: 2 minutes Comodo Threat Research Labs (CTRL) detected more than 25 million malware incidents in 223 top-level country code domains (ccTLD), in...

Tackling Cyber Security Threats in 2017

Reading Time: 3 minutesBusinesses are on a helter-skelter as the current waves of cyber attacks make them double their efforts in protecting their...

The 4th of July and the State of Online Security

Reading Time: 3 minutesThe Fourth of July is an opportunistic time for shoppers to buy products that are currently in season with the...

Petya Ransomware | How It Spreads and How to Stay Ahead

After an examination of the encryption routine of the malware utilized as a part of the Petya/ExPetr assaults, experts understand that the malware...

Best 10 Features of an Effective Endpoint Security Strategy

Reading Time: 4 minutesWith overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures...

Wannacry Copycats Expected to Increase BUT There Are Solutions

Reading Time: 3 minutesHere we go again…it should come as no surprise to anyone who follows cybersecurity that another massive cyberattack has occurred,...

The WannaCry Ransomware Attack: Combating Ransomware is Possible

Reading Time: 2 minutesWannaCry, the ransomware that attacked networks in many leading healthcare organizations and other organizations across the globe on Friday, is...

Imagining a World without Language Barriers

An article by Brandon Deer, originally published at OpenView Labs – “A Conversation on the Future of AI with Unbabel’s Vasco Pedro“Vasco Pedro has always been...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

Latest Intelligence

spot_img
spot_img