The BlackBerry® Cylance® 2020 Threat Report contains a broad range of topics vital to the interests of businesses, governments, and end-users. It delivers the combined security insights of BlackBerry and Cylance.
The 2020 Threat Report examines 2019’s major security breaches and considers recent advancements that may prevent past mistakes from repeating. The Report provides a deep dive into current cybersecurity issues with an eye toward not merely chronicling what happened, but also analyzing the conditions that allowed for those events.
Download this report to support your efforts to combat the onslaught of threats that will surely be unveiled in the new year — and over the course of the next decade
The information security field is economically inefficient. This is both good and bad. Bad, because it means billions of dollars are squandered on solutions which offer their buyers sub-optimal returns. Good, because the opportunities exist to...
Since the Pandemic, security breaches have increased by 32% due to remote working , many sectors are now facing new and more sophisticated cyberthreats. It might be time to review your security endpoint solutions and you want to make choices that...
Businesses, governments, organizations and people have become accustomed to real-time information, communication, and action. This increased level of connectivity has allowed us to become more efficient, productive and resilient. For instance,...
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? This book explains how artificial intelligence (AI) and...
As Roger Sels of BlackBerry assesses cybersecurity risk, he sees both cyber and endpoint chaos as well as enterprises trying to defend automated attacks at human speed. Sels says today’s biggest challenge is that defenders have given up on...
Zero Trust, as the name implies, is a security model built around the idea that nothing inside or outside of an organization can be trusted. The foundation of Zero Trust architecture came from the Jericho Forum in the early 2000s, where security...
The explosion of mobile devices has spawned a parallel, more insidious, phenomenon: the rise of mobile malware and cyberattacks. A recent Verizon report indicates that one out of three enterprise attacks now involves a mobile device. Moreover, the...
In this guide, we provide a methodology and roadmap for organizations of all sizes to use in assessing and advancing the maturity of their cyber risk management programs. We employ a four-tiered framework that encompasses endpoint protection...
Chaos and confusion dominated the enterprise cybersecurity landscape even before the COVID-19 pandemic. The increasing volume and variety of endpoints in organizations combined with ever-increasing cybersecurity threats put tremendous pressure on...
This guide is intended to highlight major points of interest from the BlackBerry® Cylance ® 2020 Threat Report. Our analysis is derived from customer and industry threat data that spans 2019, and is presented for the benefit of security...
Is your organisation ready to securely support a wide range of remote workers in the wake of a global pandemic? Given the uncertainty a widespread health crisis can bring, infectious disease specialists at the CDC and elsewhere have advised...
A R T I F I C I AL IN TE LLIGE N C E : THE SMART ER APPROACH TO INFO RMATI O N S ECURI TY The Current Threat Landscape The news headlines are replete with stories of devastating data breaches, compromising the personal and professional data of...
This leads to constant complaints among end-users at many organizations, who want to know why their systems are so slow or why it takes 15 minutes to boot up every workday morning. Furthermore, this also increases costs and reduces productivity,...
AI IS MOVING THE NEEDLE FOR COMPANIES IN THE US, THE UK, FRANCE, AND GERMANY. O1 OVERVIEW Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa,...
Neue Studien zeigen, was für schwerwiegende Auswirkungen die Sicherheitstechnologie auf die Benutzererfahrung haben kann. Eine Online-Befragung von 460 IT-Experten und 301 Geschäftsbenutzern in den USA, im Vereinigten Königreich und in...
TEST created binaries for five possible attack scenarios. These were then modified in two different ways creating 15 test cases. 1. Installation: The product is installed and updated to the latest program version and signatures 2. The test was...
A I - DR I V E N E DR The State of Endpoint Insecurity The security professional’s job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run, and outsmart most security systems. No matter...
Executive Summary Benefits And Costs Decommissioned on-premises legacy endpoint security software: $8.4 million PV Time savings from faster remediation: $3.3 million PV Total cost: $7.0 million PV Employee endpoints are the interfaces between...
Les tentatives antérieures visant à appliquer l’apprentissage automatique à la cybersécurité ont échoué pour diverses raisons. Bien souvent, les échantillons de données étaient absents, les algorithmes trop imprécis ou les coûts trop...