How to

New eBook Preview: Endpoint Security Buyer's Guide

This post is a preview of our new Endpoint Security Buyer's Guide, which you can download here. I'd love to hear your feedback, so take a look...

Read More
May 2016
How to

5 Security Safety Nets that Can Protect Your Users from Cyber Attacks

Prepare to be amazed as your users open suspicious email attachments with the greatest of ease!

Read More
Apr 2016
Threats 101

Badlock 101: Skip the Hype and Patch the Bug

What is Badlock? Badlock is a bug that affects Windows Active Directory\File Sharing and the Open Source Samba implementation, which is a free...

Read More
Apr 2016
How to

Everything You Need to Know About Endpoint Security (New Guide)

Introducing the IT Pro's Guide to Endpoint Protection Endpoint security isn't as simple as it used to be. For one thing, it's no longer all...

Read More
Apr 2016
How to

3 Cybersecurity Confidence Killers (and What to Do About Them)

Security is anything but an easy gig. It's a lot of work that goes into trying to make sure bad things don't happen, even though just about...

Read More
Mar 2016
Threats 101

Cyber Attacks Are Not Unique Snowflakes

At first glance, the stat can seem like a typo: Over 390,000 new malware programs are reported and classified every day. Tweet this stat But...

Read More
Mar 2016
How to

Checklist: 5 Quick Security Wins to Help Close Out Your Week

It’s 4:45 PM on Friday. Everyone is winding down from the week and gearing up for the weekend. However, think about how much better your weekend...

Read More
Mar 2016
Stats & Trends

How IT Pros Would Fix Security

IT pros face a tough challenge when it comes to protecting their users and their data. With all the moving pieces and new threats surfacing every...

Read More
Mar 2016
Stats & Trends

RSA 2016 Reactions: Is Too Much Data Hurting Security?

When attendees flooded into San Francisco's Moscone Center for this year's RSA Conference, over 550 vendors were ready and waiting for them,...

Read More
Mar 2016
How to

MSSP Matchmaker: 10 Criteria for Choosing the Right Managed Security Services Provider

For small businesses, that can be especially appealing. Not only are they becoming increasingly popular targets for cyber attacks (60% of all...

Read More
Feb 2016