Sponsored by Acronis
Categories
From VMware to what’s next: Protecting data during hypervisor migration
Broadcom’s acquisition of VMware in 2023 set off a wave…
Why a secure software development life cycle is critical for manufacturers
For all the scary talk about cyberattacks from vendors and…
Deep dive into DragonForce ransomware and its Scattered Spider connection
Security researchers have conducted an in-depth analysis of DragonForce ransomware…
Turn your Windows 11 migration into a security opportunity
Not all versions of Windows were created equal, at least…
ID verification laws are fueling the next wave of breaches
The cybersecurity community has long lived by a simple principle:…
The hidden cyber risks of deploying generative AI
Organizations increasingly think it’s a great idea, even an absolute…
Target-rich environment: Why Microsoft 365 has become the biggest risk
Microsoft 365 has become the central nervous system of modern…
The first three things you’ll want during a cyberattack
The moment a cyberattack strikes, the clock starts ticking. Files…
They know where you are: Cybersecurity and the shadow world of geolocation
Tony Soprano knew. When one of his follow poker players…
We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain
The Acronis Threat Research Unit (TRU) was presented with an…