Less than six weeks after the massive WannaCry attack, a second Windows ransomware worm, called Petya, made its way around the planet.

Read More

“How do you function as a government if everything shuts down or has a virus in it?,” asks Albany County Executive Dan McCoy, stated in the story below, first reported by News10. The answer is “You can’t function.” Government, whether at a local, state, or even federal-level, need as much, if not more, protection from viruses […]

Read More

If there is one thing we should take away from the fallout of WannaCry, it’s that we are overdue for a reset in this industry. There is greater urgency than ever to map trustworthiness into technology, not humans. Cyber security solutions should eliminate human error, not enable it.

Read More

A global cybersecurity firm has warned that another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week's assault on computers worldwide. #cybersecurity, @salesforce

Read More

Protect your Salesforce orgs against the WannaCry Ransomware attack - download EZProtect Virus Protection for Salesforce today. Free 30-day trial. #ransomware, #virusscanner, @salesforce

Read More

An unusually sophisticated identity phishing campaign appeared to target Google's roughly 1 billion Gmail users worldwide, seeking to gain control of their entire email histories and spread itself to all of their contacts, Google confirmed Wednesday.

Read More

Use strong passwords and don’t go to sketchy websites, and you’ll protect yourself online, right? A new report from Pew Research details some of American’s biggest misconceptions about #cybersecurity. @ezprotect, @salesforce

Read More

A bipartisan bill introduced in the Senate would establish the creation of a specialized committee devoted solely to cybersecurity, an effort to narrow the chamber’s scope on an emerging topic that’s become as convoluted as it is consequential.

Read More

Consistently challenge your organization through proactive testing, often referred to as “red team, blue team exercises.

Read More

While the CISO will identify risks and prioritize security protocols, it is incumbent on senior executives to understand and carry out the procedures across the business — to the most-vulnerable points of entry for cyber criminals. #cybersecurity

Read More