59 posts
What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…
The consequences of not applying patches
Many recent cyberincidents in have shared one characteristic: they have been possible thanks to a vulnerability in an IT system that needed patches.
Panda Adaptive Defense 360 earns IT Pro Editor’s Choice Award.
IT Pro, one of the UK’s most influential tech websites, has awarded Panda Adaptive Defense 360 5 stars in its latest review of the cybersecurity suite.
The victims of data protection regulations
Facebook, which has been under scrutiny for months now, has received the first large sanction for not following the data processing standards found in the legislation.
GDPR, two months later
May 25 was the day that the GDPR became obligatory across the whole of the European Union. But now that the dust has started to settle, what assessment can we make of the situation?
Data Breaches vs. Ransomware: What’s the Difference?
Cybercriminals are now using hacking attacks and insider attacks to gain access to endpoints and extract data from within the organisations network. However, a data breach in which the data is held for ransom is not the same as a Ransomware attack.
The European Parliament calls for reinforced cyberdefense in Europe
In the last 24 hours, the European Parliament has adopted a resolution that calls its Member States to strengthen their defenses against cyberattacks from state and non-state actors. The solution lies in reliable solutions that are aligned with European legislature and are responsible with data.