TECHNOLOGIES

Ransomware
Tech Explainer: How does ransomware do its dirty work?

Ransomware creates a nasty web that can infiltrate nearly any computer, mobile device or network. When ransomware takes hold, the ensuing turmoil can bring even the biggest, wealthiest organization...


Metaverse survey
Research roundup: Cyber worries, metaverse readiness, remote work recognition, hybrid-cloud skills

Cybersecurity is up. Execs are ready for the metaverse. Remote workers may be missing out. And hybrid-cloud skills are scarce. That’s some of the latest in IT research. And here’s your tech provider’...


Information literacy survey chart
Information literacy: global survey reveals serious gaps

How bad is the problem of fake news and misinformation online? Pretty bad, finds a recent report based on a survey of nearly 8,600 people worldwide. Among the survey respondents, more than 6 in 10...


Cybersecurity
Check out HP’s report on the latest security threats

Did you know that nearly 15% of email-borne malware bypasses an email gateway scanner? That malware isolated inside archives recently rose by 11%? Or that email remains the top threat vector,...


Black Hat USA 2022
Join Intel at the Black Hat USA cybersec conference

Mention a conference for hackers, and Intel may not be the first company that comes to mind. Yet Intel will have a pretty robust showing at this year’s Black Hat USA, a hybrid event being held August...


Security professional
8 cybersecurity predictions from Gartner to help you stay safe

It’s a risky world out there. To help you and your customers build your security strategies, the market researchers at Gartner recently made 8 cybersec predictions. Unless noted otherwise, all are...


Intel Partner Alliance webinars
Intel Partner Alliance webinars: Discover IPA benefits, stack your security

This month, Intel Partner Alliance is offering 2 webinars you won’t want to miss. The first will help you get more from your IPA membership. And in the second, you’ll learn how the Intel security...


Pages