Bank vault

TrickBot banking Trojan adds Canada to its target list: IBM

Three Canadian banks have been added to the target list of the TrickBot trojan's redirection targets, according to IBM's X-Force...

November 24th, 2016 Howard Solomon

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

Malware can no longer be detected with the traditional methods, which means organizations must adopt an effective defense strategy that...

November 6th, 2016 IT World Canada Team

Visibility and Control to Prevent, Detect, and Remediate Advanced Malware Everywhere

Visibility and Control to Prevent, Detect, and Remediate Advanced Malware Everywhere

Malware acts fast, and your sensitive data and critical systems are on the line. Organizations need to go beyond what...

November 2nd, 2016 IT World Canada Team

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

Organizations’ malware analysis needs have gone beyond the traditional sandboxing technologies. It’s time for a more robust malware analysis tool...

November 2nd, 2016 IT World Canada Team

The Mobile Enterprise: Is Ease of Use Overriding Security?

The Mobile Enterprise: Is Ease of Use Overriding Security?

This guide reveals IDG research on lessons learned from enterprises that have mobilized at least one Microsoft application, pros and...

September 22nd, 2016 IT World Canada Team

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

Traditional defenses, including firewalls and endpoint antivirus, no longer work against these attacks. The process of handling malware must evolve...

September 18th, 2016 IT World Canada Team

Buying Criteria for Next Generation Security

Buying Criteria for Next Generation Security

Enterprises need to push for better security and focus on threats that penetrate their networks, because maintaining traditional perimeter security...

September 18th, 2016 IT World Canada Team

Breach Detection Systems Test Report

Breach Detection Systems Test Report

It’s important for organizations to detect product breaches before a malware attack occurs, and leverage the right tools to do...

September 18th, 2016 IT World Canada Team

Cisco 2016 Midyear Cybersecurity Report

Cisco 2016 Midyear Cybersecurity Report

Ransomware is dominating the malware market - and businesses are becoming the target of choice for cybercriminals. Organizations are creating...

September 18th, 2016 IT World Canada Team