Category: Cyber Security
Channel partners have immense new service opportunities to protect their customers from rising numbers of targeted and fileless attacks with a leading-edge managed endpoint detection and response service.
F-Secure’s new Incident Response Report points to email inboxes as the weakest link in security perimeters, and finds that companies struggle with quickly and accurately detecting security incidents.
To improve strategy execution, the company reorganizes and introduces important new roles to F-Secure’s Leadership Team.
F-Secure is partnering with the Global Cyber Alliance to step up the fight against malicious URLs with a secure DNS service that companies and individuals can use for free.
New service quantifies breach impact in real numbers before it happens, empowering decision makers to invest in the right security controls.
Insecure IP cameras are yet another example of IoT devices that are not built to withstand the threat landscape of the internet.
With its unique web topology mapping feature, F-Secure Radar does what other vulnerability management tools won’t: It helps admins discover their full attack surface, internal and external.
Government reluctance to shut down the virtual currency Bitcoin has made the rapid growth of cyber-extortion possible, but that could change if the United States or China shifts law enforcement priorities.
F-Secure Labs uncovers cyber attack group collecting intelligence on foreign and security policy in Europe using spyware developed for law enforcement agencies.
Overconfidence in technology is leaving companies exposed to phishing and other attacks that prey on humans, as evidenced by red team tests where 52% of employees clicked on a link in a fake email.
F-Secure’s new cyber security report paints a stark picture of the threats posed by insecure networks and devices, the internet of things, cyber crime, and more.
F-Secure researchers find multiple vulnerabilities in a NAS device that attackers can use to steal data and passwords, or even remotely execute commands.