Quantcast
Channel: Grayson Milbourne | Webroot Blog
Browsing latest articles
Browse All 65 View Live

Image may be NSFW.
Clik here to view.

Webroot’s 2015 SMB Threat Report: An Analysis

Reading Time: ~3 min.Recently, Webroot published 2015 SMB Threat Report: Are organizations completely ready to stop cyberattacks?, which included the results from a survey of 700 SMB decision makers...

View Article



Top Security Predictions for 2016

Reading Time: ~2 min.As 2015 comes to an end, we all look back at the huge list of big-name data breaches that occured, from passwords revealed to full on dating identities. It was not a pretty year...

View Article

Threat Insights and Trends from the 2016 Threat Brief

Reading Time: ~4 min.Intro from the 2016 Threat Brief: “2015 was yet another record year for cybercrime, during which more malware, malicious IPs, websites, and mobile apps were discovered than in any...

View Article

Hackers: Fact vs. Fiction

Reading Time: ~ 3 min. Have you ever watched a movie and seen a character doing something you know how to do, and thought to yourself, “jeez, that’s totally wrong. Couldn’t they have done a little...

View Article

The Truth about Hackers, in Black and White (and Grey)

Reading Time: ~ 4 min. Did you know there are three primary types of hacker—white hats, black hats, and grey hats—and that there are subcategories within each one? Despite what you may have heard, not...

View Article


Pay Attention to the Hacker Behind the Hoodie

Reading Time: ~ 3 min. There’s a pretty common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organizations. Unfortunately, this belief couldn’t...

View Article

Targeted assets: The need for cyber resilient infrastructure

Aging infrastructure in the United States is not confined to crumbling roads and bridges. Recent events have shown that connected devices in our pipelines, water treatment facilities and power grids...

View Article

Data Privacy Week 2022: The Security Awareness Canary in the Coalmine

Whether you’re shopping for the latest tech gadgets or checking your work email, your online presence is susceptible to malicious threats. No industry or sector is immune. Even in the early days of...

View Article


Soaring ransomware payments, consistent infections, deceptive URLs and more...

Cyber threats are becoming increasingly difficult to detect. Cybercriminals are also becoming experts in deception. What does this mean for your business? How can you keep your family members safe...

View Article


Image may be NSFW.
Clik here to view.

BrightCloud® Threat Report Mid-Year Update: Reinvention is the Name of the Game

When was the last time you secretly smiled when ransomware gangs had their bitcoin stolen, their malware servers shut down, or were forced to disband? We hang on to these infrequent victories because...

View Article
Browsing latest articles
Browse All 65 View Live




Latest Images